Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 13:10
Static task
static1
Behavioral task
behavioral1
Sample
71293ad2416b9a68bba63a729f87afb7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71293ad2416b9a68bba63a729f87afb7.exe
Resource
win10v2004-20231222-en
General
-
Target
71293ad2416b9a68bba63a729f87afb7.exe
-
Size
88KB
-
MD5
71293ad2416b9a68bba63a729f87afb7
-
SHA1
6556526c71e5772593e299c46e5587dfe66b8cca
-
SHA256
07e4ea8429dce643bd2083f6053c656bfa3d994fee07b40897acb469cac0d68b
-
SHA512
3e5e1f712835ff531520b2e9fa12b7d4efbc17532be21306d5eaf63beb852a211ad7bd3becfa6a3ecdf935bdf5d812f2aa6103a427221e66b88dcbc478cd2534
-
SSDEEP
768:xg3+4NTlezZEatuHqLPkhEryY5USTMSuHcj19lmVWUE2q7NRbCxX5HoL3/QZZHwq:xu+4NeZmhtYhUKLPyQH2xEAAwT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 71293ad2416b9a68bba63a729f87afb7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3040 4604 71293ad2416b9a68bba63a729f87afb7.exe 25 PID 4604 wrote to memory of 3040 4604 71293ad2416b9a68bba63a729f87afb7.exe 25 PID 4604 wrote to memory of 3040 4604 71293ad2416b9a68bba63a729f87afb7.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\71293ad2416b9a68bba63a729f87afb7.exe"C:\Users\Admin\AppData\Local\Temp\71293ad2416b9a68bba63a729f87afb7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\71293ad2416b9a68bba63a729f87afb7.exe" >> NUL2⤵PID:3040
-