Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
2ccdcea5e295d5c53f048fc75d9cf2df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ccdcea5e295d5c53f048fc75d9cf2df.exe
Resource
win10v2004-20231215-en
General
-
Target
2ccdcea5e295d5c53f048fc75d9cf2df.exe
-
Size
692KB
-
MD5
2ccdcea5e295d5c53f048fc75d9cf2df
-
SHA1
f1059bb988cedc9823768b9944dc41660f56c7d5
-
SHA256
1e98165b95c1176b4c7d513c50fcce00a13049802d174c5bbf102df48e8b3f35
-
SHA512
9680db1fa6a4e11653840ddebdfb5392db5960ceccb18bfafe6b32b6753aa728b40c56322238a2526f0d1858ea49b061ada54ce38dac89792ff7b9c090d25cad
-
SSDEEP
12288:I0TKvMYHM81VKILrxANM6Rtoc+Q+mzj6lFQFl1iWybtBGZzqSFF:BM1JNANRRG8zzj/lotBGZ+SFF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2ccdcea5e295d5c53f048fc75d9cf2df.exe -
Executes dropped EXE 1 IoCs
pid Process 3088 az.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4012 3088 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3088 1564 2ccdcea5e295d5c53f048fc75d9cf2df.exe 90 PID 1564 wrote to memory of 3088 1564 2ccdcea5e295d5c53f048fc75d9cf2df.exe 90 PID 1564 wrote to memory of 3088 1564 2ccdcea5e295d5c53f048fc75d9cf2df.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ccdcea5e295d5c53f048fc75d9cf2df.exe"C:\Users\Admin\AppData\Local\Temp\2ccdcea5e295d5c53f048fc75d9cf2df.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\az.exe"C:\Users\Admin\AppData\Local\Temp\az.exe"2⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 2563⤵
- Program crash
PID:4012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3088 -ip 30881⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603KB
MD580dd7b689764b6a7a00f51bad03f958d
SHA1eba6f08296c0966997053c08f65ecbc8ac03c0a8
SHA25630779c1c094a74d0ff2053c06ec3e7d599337d62e80ddc4c811e7c30ba0c0624
SHA512ecd8f29618ddb324d553081fe8f8d71c44d95120cef613ec52f44f37dd6dbe45192830eb7e2a69cfd6997d2ca1036c624c516b2b91583766feb30f8667acd4d1