Analysis
-
max time kernel
190s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 00:54
Static task
static1
Behavioral task
behavioral1
Sample
092d6e43f5ca44d842d39ce6f99b15ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
092d6e43f5ca44d842d39ce6f99b15ce.exe
Resource
win10v2004-20231215-en
General
-
Target
092d6e43f5ca44d842d39ce6f99b15ce.exe
-
Size
29KB
-
MD5
092d6e43f5ca44d842d39ce6f99b15ce
-
SHA1
5633ed1e2f69daddccd6fe4e01255a6210828e39
-
SHA256
52a76745a0be36cd5ffbbc60db86fdc3dba05d1253d9803e3a4dfbe04ef0c9b6
-
SHA512
b83c3781ba4e4be209d09bffae85765218c65353dac86f7bd771d9abd0ec7740b3fbd0a393ec4c76874a820c5070f7e4f5fee69ef77b01a337ca22dd28aff2d7
-
SSDEEP
768:osJX+vzlGKec5+RZDKzepeNPmG6JX6UOPh:osJElGKecg/DcepeNPmG6JX1G
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 092d6e43f5ca44d842d39ce6f99b15ce.exe -
Executes dropped EXE 1 IoCs
pid Process 3324 updater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3324 3992 092d6e43f5ca44d842d39ce6f99b15ce.exe 92 PID 3992 wrote to memory of 3324 3992 092d6e43f5ca44d842d39ce6f99b15ce.exe 92 PID 3992 wrote to memory of 3324 3992 092d6e43f5ca44d842d39ce6f99b15ce.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\092d6e43f5ca44d842d39ce6f99b15ce.exe"C:\Users\Admin\AppData\Local\Temp\092d6e43f5ca44d842d39ce6f99b15ce.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe"2⤵
- Executes dropped EXE
PID:3324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5bffb32a6da1088323001bcbf68c6004a
SHA164acae7ae2cc252de8a9eb5e4539a2f07328d6c6
SHA2564cb5c0131668d7eaf10d4f8131c04edf514dfc20f5a5433fcbb87aeb22ed538b
SHA512a1a0a103ad47e43881b83c3799978566c4f197e83d5b4f1d60b0d711f206d4c6ecae6502499e7c21291a326a2f7bf0a9a5bf80dff987f3c2be34097dacfa7084