Analysis
-
max time kernel
0s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
1214178fc43657a53bc7487df47ab56b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1214178fc43657a53bc7487df47ab56b.exe
Resource
win10v2004-20231215-en
General
-
Target
1214178fc43657a53bc7487df47ab56b.exe
-
Size
115KB
-
MD5
1214178fc43657a53bc7487df47ab56b
-
SHA1
492d3a326c20454698138ddd2b4df1cbebaa5e2a
-
SHA256
4d050ad0268e4ba9ed482f8c4835a52549364d282e5249fc72dd93970a46de0d
-
SHA512
28a14ccae34e7a4a8f41691357d6da0a782a8fa9bbd6b88fd003ece1121ac8f4ddd0ee64923b67bd1e862c6164d72d8e57e1772136f51e798a598eadbbcd110a
-
SSDEEP
1536:UkoAzrk0MkJaG3Tmi8eCWWAu4+y268gtZYL86P7EZ3c:JRzrnMZG318eCWlkyB86ZY46wO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 1214178fc43657a53bc7487df47ab56b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1476 wrote to memory of 3736 1476 1214178fc43657a53bc7487df47ab56b.exe 25 PID 1476 wrote to memory of 3736 1476 1214178fc43657a53bc7487df47ab56b.exe 25 PID 1476 wrote to memory of 3736 1476 1214178fc43657a53bc7487df47ab56b.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\1214178fc43657a53bc7487df47ab56b.exe"C:\Users\Admin\AppData\Local\Temp\1214178fc43657a53bc7487df47ab56b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Enf..bat" > nul 2> nul2⤵PID:3736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5408297723d37c244a62f239f062f295f
SHA14ba7f6b546e8d4def80401b057c8fe2e5dc95053
SHA25645129f7fb2015a4f9d53cd1cbf96b509ec33a13d2075a780be07f64fe80d3051
SHA512bb523376ce9e16a1eaac7c18fd9b4920b74721b1577d298d99a77f50b471424ac5034f74f61b2194032564d68c33b3cd01fc58e4dd2f602db02e508cb4394ab5