Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
618fa1db7acc7f02d511756a2fdb6307.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
618fa1db7acc7f02d511756a2fdb6307.exe
Resource
win10v2004-20231215-en
General
-
Target
618fa1db7acc7f02d511756a2fdb6307.exe
-
Size
367KB
-
MD5
618fa1db7acc7f02d511756a2fdb6307
-
SHA1
f14c94c1135d59846597669e6e9dfc1423a53fe7
-
SHA256
21f81570630af5e52ce9804d80cf060a5f0553856f9154f325e9fdcbc2ef10f8
-
SHA512
d35912817b248fd468c22be1565e6d69da241b3746e94c2154311f821f939af50dbd1adc5aef44ef709480bf12a19ec5679298f7bfe2d873fa48bf1551aa899f
-
SSDEEP
6144:iO/N4yidWNLbii5bkgVuN+xSKV7Wkrsf7LsQH8frtCj6SLoI:iOVedQXikbkgaISKVy8A6SLoI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 618fa1db7acc7f02d511756a2fdb6307.exe -
Executes dropped EXE 1 IoCs
pid Process 5020 62F0DE83-45A3-44DB-9697-4A140AC85636.exe -
Loads dropped DLL 1 IoCs
pid Process 4292 618fa1db7acc7f02d511756a2fdb6307.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4292 wrote to memory of 5020 4292 618fa1db7acc7f02d511756a2fdb6307.exe 91 PID 4292 wrote to memory of 5020 4292 618fa1db7acc7f02d511756a2fdb6307.exe 91 PID 4292 wrote to memory of 5020 4292 618fa1db7acc7f02d511756a2fdb6307.exe 91 PID 4292 wrote to memory of 2816 4292 618fa1db7acc7f02d511756a2fdb6307.exe 94 PID 4292 wrote to memory of 2816 4292 618fa1db7acc7f02d511756a2fdb6307.exe 94 PID 4292 wrote to memory of 2816 4292 618fa1db7acc7f02d511756a2fdb6307.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\618fa1db7acc7f02d511756a2fdb6307.exe"C:\Users\Admin\AppData\Local\Temp\618fa1db7acc7f02d511756a2fdb6307.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\b991cc78-47ba-40fc-a139-37062ab6db2a\62F0DE83-45A3-44DB-9697-4A140AC85636.exe"C:\b991cc78-47ba-40fc-a139-37062ab6db2a\62F0DE83-45A3-44DB-9697-4A140AC85636.exe" -y -p8FEF45FA-F2B3-40D5-B6AB-8B0A80D765212⤵
- Executes dropped EXE
PID:5020
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" c:\b991cc78-47ba-40fc-a139-37062ab6db2a\start.hta2⤵PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5fa99d30e757956d6d8bf6db9005ee081
SHA141b5a5f11ff3d7691ca261971e7336faf1d1a1f9
SHA256b6a51af80991b7a1acdaa6cfd7f3bb55057b6884e68e0374c62826de64dd5c83
SHA512e215c16828eb35e62cc4956cf8b6631c10bfcd435b7eff33366a969a32f029d787b394e62c970d14f10184a7754fc33f22e0641fcebf3ac05449836620939a9a
-
Filesize
132KB
MD5c6bb5c8c284dca85783c63b72bcfd320
SHA1bddb5f3b7cae522d3a35a677b2181c3a2d5c3689
SHA256690e586d7c0ed8c49b44dd42580a9451a02b3b25db22b200b81a803ef847d666
SHA512c79c1cabdb5bc0f1070dfcde2b4182e9092be1719e140f1cf510bd19ffb2f08945f60ca4dfdeb2f83b443ffa4a3431304ea56f288bb11c233bcf72dd3ccf8f60
-
Filesize
1KB
MD5e88ebd85dd56110ac6ea93fe0922988e
SHA1684a31d864d33ff736234c41ac4e8d2c7f90d5ae
SHA256379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb
SHA512211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7
-
Filesize
1KB
MD5db4ada697fa7a0e215281533d52578e9
SHA1fb755ea8371edf5065dc53e21eb413603f9eba7f
SHA256f949fd6ca734830572128b4348dfd039419140c7ef501d80773f71ca3f0ed78c
SHA5129ba1d2658785dd3c88b4399132f8330dc58872235e19ca9854b0e453d8cc7a58de0c8be84da376a72b5851073f531c95b2c6afa84f43053561ca8e6751d6e2f3