Analysis
-
max time kernel
164s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
62d8ececc93a3ff981bf3aa2f6a90149.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
62d8ececc93a3ff981bf3aa2f6a90149.exe
Resource
win10v2004-20231215-en
General
-
Target
62d8ececc93a3ff981bf3aa2f6a90149.exe
-
Size
266KB
-
MD5
62d8ececc93a3ff981bf3aa2f6a90149
-
SHA1
2d51e8bf580a0e03d4821c5ed2779bdbe137b42b
-
SHA256
79e9508b2980dcc3e4a23281e9289d9d88e8ebe0d140f776cc98e99187cdcc17
-
SHA512
c9a6d5de391a87848b722d402cb628496d89fa1fedc08683dd455374354c704c255ac19056abe225f3508b5e867f7744947e82293d368fc4bdac6224c265eb8b
-
SSDEEP
6144:cYQNTIeB2p+mc8D1OLdz0EXStoaxPily/Vulqk1hIpNg:cYmznc1M0csoaxqly/8lHUg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 62d8ececc93a3ff981bf3aa2f6a90149.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4400 3188 62d8ececc93a3ff981bf3aa2f6a90149.exe 97 PID 3188 wrote to memory of 4400 3188 62d8ececc93a3ff981bf3aa2f6a90149.exe 97 PID 3188 wrote to memory of 4400 3188 62d8ececc93a3ff981bf3aa2f6a90149.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\62d8ececc93a3ff981bf3aa2f6a90149.exe"C:\Users\Admin\AppData\Local\Temp\62d8ececc93a3ff981bf3aa2f6a90149.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /u /s "C:\Program Files (x86)\RelevantKnowledge\rlls.dll"2⤵PID:4400
-