Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 19:52
Static task
static1
Behavioral task
behavioral1
Sample
0ef75bb88552494a76537f4924861b19.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ef75bb88552494a76537f4924861b19.exe
Resource
win10v2004-20231215-en
General
-
Target
0ef75bb88552494a76537f4924861b19.exe
-
Size
118KB
-
MD5
0ef75bb88552494a76537f4924861b19
-
SHA1
2689c22a965e343aaab021be132ea89924d8f61e
-
SHA256
290d6fd2303d63a5003ea57417de08b4bb2183ee0476adcedb8775b6801e5605
-
SHA512
b21052867e99e0dc70bc06fc193ad8c8511c0b42f1a34381ed9f6abb42dcc70e0611ae3f0f109f660547c43dd2ca8336463331be2f616a2fa695b4340a08fde8
-
SSDEEP
3072:Ln2xwJQ7c8S7Y8drUAxA79WUUZs1BQkVOYy6CrU688RS:LSI8AY6rUIA79UzX64VS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 0ef75bb88552494a76537f4924861b19.exe -
Executes dropped EXE 1 IoCs
pid Process 740 tt.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\tt.exe 0ef75bb88552494a76537f4924861b19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 4076 740 WerFault.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1848 0ef75bb88552494a76537f4924861b19.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 740 1848 0ef75bb88552494a76537f4924861b19.exe 24 PID 1848 wrote to memory of 740 1848 0ef75bb88552494a76537f4924861b19.exe 24 PID 1848 wrote to memory of 740 1848 0ef75bb88552494a76537f4924861b19.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef75bb88552494a76537f4924861b19.exe"C:\Users\Admin\AppData\Local\Temp\0ef75bb88552494a76537f4924861b19.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\tt.exe"C:\Windows\tt.exe"2⤵
- Executes dropped EXE
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 740 -ip 7401⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 2201⤵
- Program crash
PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5d4db45d6a8b112adb76d31910780f4cf
SHA16fa414a99494e2e982303d51c2177c5dbd2123a8
SHA256ebea770d2bcb5c7abeee35a70a3f62357e920dadef9d09dab098c543b6fe5b9d
SHA51250899393a6f453cdf9290a180bd8511e7130064f8b79cded14563665db2994559ef5d7b47259dc9cbc523a52eb19751e1d9255d0afcea78f6de850924b7dd2b6