Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
0534fcf0586b5fbaa45612ce8c3119d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0534fcf0586b5fbaa45612ce8c3119d8.exe
Resource
win10v2004-20231215-en
General
-
Target
0534fcf0586b5fbaa45612ce8c3119d8.exe
-
Size
105KB
-
MD5
0534fcf0586b5fbaa45612ce8c3119d8
-
SHA1
d6452546a4854b6df88e7cf6818a9722c71ed982
-
SHA256
061f7b3f147a974d2b6a0170dbd3cda7314f1e92b8e553248b622c1f9dfd2b70
-
SHA512
d42a730506b17e7aae990fc2a907fc8c87fa42186a6cc7218385e509a10daa6229ac0ac4e1e476773ce73b50c6924e9f652f596e011dc960b8dc27e1ea4a76d1
-
SSDEEP
1536:iJPmAHnTcXKD0IhojSE9fkyIU6hq5vhaGbihPTMDIdCOgl8moNWZn2y5rkINQBEB:ipmKYXvRSmkxU6hQPRGgemFXkOEE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 0534fcf0586b5fbaa45612ce8c3119d8.exe -
resource yara_rule behavioral2/memory/4692-1-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/memory/4692-3-0x0000000000400000-0x000000000042C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4692 0534fcf0586b5fbaa45612ce8c3119d8.exe 4692 0534fcf0586b5fbaa45612ce8c3119d8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3104 4692 0534fcf0586b5fbaa45612ce8c3119d8.exe 28 PID 4692 wrote to memory of 3104 4692 0534fcf0586b5fbaa45612ce8c3119d8.exe 28 PID 4692 wrote to memory of 3104 4692 0534fcf0586b5fbaa45612ce8c3119d8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0534fcf0586b5fbaa45612ce8c3119d8.exe"C:\Users\Admin\AppData\Local\Temp\0534fcf0586b5fbaa45612ce8c3119d8.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Xnp..bat" > nul 2> nul2⤵PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD51eb0f9b5bd701342fbd0017fd8d93dec
SHA131aec1ff1b0e22eb8d23696f35a09ff0ffe6dca4
SHA25683efdcbea31fbbd11cacf0836c0ef14adcbe9e580acc4f2784cb77bb40d7871f
SHA51280ec2e224f7d15ad4f2a7860342d6c7239a4cc84ac311b88e729197ed47f5be75f430b718440fc5e1d2816dc16b801de7d8fde2d0d863b693a3c8cc800ec20c6