Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 01:12
Behavioral task
behavioral1
Sample
4854521d53fac8a8112d70cd0008e924.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4854521d53fac8a8112d70cd0008e924.exe
Resource
win10v2004-20231215-en
General
-
Target
4854521d53fac8a8112d70cd0008e924.exe
-
Size
107KB
-
MD5
4854521d53fac8a8112d70cd0008e924
-
SHA1
2781d03afb5b1ec8e1603ce510ebce05dd0bb8bf
-
SHA256
8f6592b39ee9ae7988046ec0fb61a59025f40c2e704494951e26da34967ac86a
-
SHA512
431739012c593c2ee93ef176d770561f0b194ccfe7979e43ddb20112db1b0b71eef772ff5e535105243d08871c0fd80a615d897c99fb2d6ccc936d21cee0ec78
-
SSDEEP
1536:a5H7T9Z5s3Tczc/xupejeIe1XbDxVQTRJnX8pHBp68wJrraLj00gEU8ydcnXAmp4:YH7BHsg6P8hxVQLXSp4xz0RUxSXA+4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 4854521d53fac8a8112d70cd0008e924.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 Kopie von ente.exe -
resource yara_rule behavioral2/memory/3780-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3780-12-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3780 wrote to memory of 2832 3780 4854521d53fac8a8112d70cd0008e924.exe 92 PID 3780 wrote to memory of 2832 3780 4854521d53fac8a8112d70cd0008e924.exe 92 PID 3780 wrote to memory of 2832 3780 4854521d53fac8a8112d70cd0008e924.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4854521d53fac8a8112d70cd0008e924.exe"C:\Users\Admin\AppData\Local\Temp\4854521d53fac8a8112d70cd0008e924.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Kopie von ente.exe"C:\Users\Admin\AppData\Local\Temp\Kopie von ente.exe"2⤵
- Executes dropped EXE
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD53a9029934bf9a8b8434595e92a3df146
SHA1f74ebf4108c2eb91acf60600d3981fe5379ecb68
SHA2564e251877b0ef3abd4c6a075f49c2075ce68e995850c56ec74e63fe457ef557f2
SHA5120be46a4667ffbb78073def92e10d2d6868ca3a0f332c8dfa10bd550544c2380e6000c0e3a901e25203831c2616e5441da399d6eef8afc977438ae84868c7238f