Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
65b712ca09bba28130a2da13be851ae1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65b712ca09bba28130a2da13be851ae1.exe
Resource
win10v2004-20231215-en
General
-
Target
65b712ca09bba28130a2da13be851ae1.exe
-
Size
64KB
-
MD5
65b712ca09bba28130a2da13be851ae1
-
SHA1
0c98ef02fce66aba5a5a4209d1dbcec9b984f4a6
-
SHA256
b796e88888a2c4a4bdf5761bf7adf647de333c7af9861c28aa8a174cf12fc85e
-
SHA512
a4e609b18512ac901cf4c4f117808d39ddbb499ca5fcfec9f8df9be7d4d2c4913c4973395be2c20d5b240b0050da5b65d30e8e3d988af3fa615406163957588f
-
SSDEEP
1536:VfS9oZjr91SAuShInwerpMaOBoDA1DFN+8ucpIOh:o9oZjr91SAVh8PrevomFPucxh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 65b712ca09bba28130a2da13be851ae1.exe -
resource yara_rule behavioral2/memory/4772-1-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4772-3-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4772 65b712ca09bba28130a2da13be851ae1.exe 4772 65b712ca09bba28130a2da13be851ae1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1516 4772 65b712ca09bba28130a2da13be851ae1.exe 91 PID 4772 wrote to memory of 1516 4772 65b712ca09bba28130a2da13be851ae1.exe 91 PID 4772 wrote to memory of 1516 4772 65b712ca09bba28130a2da13be851ae1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b712ca09bba28130a2da13be851ae1.exe"C:\Users\Admin\AppData\Local\Temp\65b712ca09bba28130a2da13be851ae1.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Bnv..bat" > nul 2> nul2⤵PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD58670db528e7f054a15879dddefa94d01
SHA12e00b016ba7fd640b70dee538976563feb09a3d9
SHA256513a181608d1901cdc54b69fe8b78d437a4af544a822d4527feb1da27e2df174
SHA512ef08cfc808f8449c37b8eee0de80959b8e3d3748c941bf4853783ad3cec6dbfe02f5c9081eae67e9d450e90c0af01025053e77b470d3dd161cac20bbded2e447