Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2e0d91d2f53c8972b85474a0af5a4ccd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e0d91d2f53c8972b85474a0af5a4ccd.exe
Resource
win10v2004-20231222-en
General
-
Target
2e0d91d2f53c8972b85474a0af5a4ccd.exe
-
Size
835KB
-
MD5
2e0d91d2f53c8972b85474a0af5a4ccd
-
SHA1
579424294f6b61994420553324262fa870122c28
-
SHA256
59a0e7d0bfcc51a30a03d8e593efc404c6c80293e8f130f34122a4fb2bcf3103
-
SHA512
d254b1b4a448840ab612c6ab4b370f519a00825988c8d9f61427a17cd847b884563d2209d01fd9d5729f381fcfc8bc51cca8450b5ea631a8b415c86e7910785e
-
SSDEEP
12288:94xkDWn1noBIR2ZWyJn5hKaPysbikwlc4FToFu8SMr23:9UpnfnyMaPysbiDO4ZoFu/v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2e0d91d2f53c8972b85474a0af5a4ccd.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 WINRAR32.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2212 5068 2e0d91d2f53c8972b85474a0af5a4ccd.exe 90 PID 5068 wrote to memory of 2212 5068 2e0d91d2f53c8972b85474a0af5a4ccd.exe 90 PID 5068 wrote to memory of 2212 5068 2e0d91d2f53c8972b85474a0af5a4ccd.exe 90 PID 2212 wrote to memory of 3148 2212 WINRAR32.EXE 92 PID 2212 wrote to memory of 3148 2212 WINRAR32.EXE 92 PID 2212 wrote to memory of 3148 2212 WINRAR32.EXE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e0d91d2f53c8972b85474a0af5a4ccd.exe"C:\Users\Admin\AppData\Local\Temp\2e0d91d2f53c8972b85474a0af5a4ccd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"3⤵PID:3148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD531f2b901f6b937a3f54c3abe9e867349
SHA169da344d610f13cbef655ca6a2b378f60dd3071f
SHA256de252d3111ed1bec4fed91300559fe0513f4f6295776f4778c3a053db13ad17b
SHA51274dbad43d0ecd6e03b433fb928bd85b961bdb2a2606bf442586d5b07b1bfb01f9a804f05cac92556ee34f895c8b6d7b4485369930476ef554f71be7a9aee06c2