Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
0f253cb77c46f7ed50c3f9cefc6a04af.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f253cb77c46f7ed50c3f9cefc6a04af.exe
Resource
win10v2004-20231215-en
General
-
Target
0f253cb77c46f7ed50c3f9cefc6a04af.exe
-
Size
61KB
-
MD5
0f253cb77c46f7ed50c3f9cefc6a04af
-
SHA1
5b2c1c5e9f509e5cb89a0d922b7e2eb96fd54058
-
SHA256
dc076be8b042f88f2dc7f9468372d373b159df2b8595879dc9a0a7d70b2d2a2a
-
SHA512
3e185166d6fe60f6333c31dca9d71b087542512001bc474e0dbfac9ec32c56302fdedf9777828ee6b2f4b7d937487064026851dcb38a758a123097b68e9d80bb
-
SSDEEP
768:ig1eR9+KpvS3p2v3yrVKbKGVit4sgSSpwlXRJVSvsSQ+oPZIxyFNFzTami3pdWSG:U03p2/H1dSgw3fSaIxE3amiH1Di
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 0f253cb77c46f7ed50c3f9cefc6a04af.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 Uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2464 3680 0f253cb77c46f7ed50c3f9cefc6a04af.exe 91 PID 3680 wrote to memory of 2464 3680 0f253cb77c46f7ed50c3f9cefc6a04af.exe 91 PID 3680 wrote to memory of 2464 3680 0f253cb77c46f7ed50c3f9cefc6a04af.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f253cb77c46f7ed50c3f9cefc6a04af.exe"C:\Users\Admin\AppData\Local\Temp\0f253cb77c46f7ed50c3f9cefc6a04af.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe" end2⤵
- Executes dropped EXE
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD50f253cb77c46f7ed50c3f9cefc6a04af
SHA15b2c1c5e9f509e5cb89a0d922b7e2eb96fd54058
SHA256dc076be8b042f88f2dc7f9468372d373b159df2b8595879dc9a0a7d70b2d2a2a
SHA5123e185166d6fe60f6333c31dca9d71b087542512001bc474e0dbfac9ec32c56302fdedf9777828ee6b2f4b7d937487064026851dcb38a758a123097b68e9d80bb