Analysis
-
max time kernel
138s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
0f4b679d7cb344ac303b2b394a2fda68.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f4b679d7cb344ac303b2b394a2fda68.exe
Resource
win10v2004-20231215-en
General
-
Target
0f4b679d7cb344ac303b2b394a2fda68.exe
-
Size
723KB
-
MD5
0f4b679d7cb344ac303b2b394a2fda68
-
SHA1
f86efc64c21a2a8ee6156f43b12b1cdf39cedbdc
-
SHA256
1dfcb8c642765fef770f5119763f81438a28ade367520184581d0b71a7c3e525
-
SHA512
32df9e4c4e1da79c4bc645455faa5676aecd8e3a8ec507d9c4a787e83d9e62e08e5b11e12d4cdafa34672fa9f0a30ad3c6ef844cf9fb60b623c3a3590b7701a6
-
SSDEEP
12288:tBpQUlDhQ7QfER7QtCDBV5E5GGptWQHII9Hp:PnDhoQfk7QtKBVcII9Hp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 0f4b679d7cb344ac303b2b394a2fda68.exe -
Executes dropped EXE 1 IoCs
pid Process 4812 rbulecyzmfe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4812 2040 0f4b679d7cb344ac303b2b394a2fda68.exe 94 PID 2040 wrote to memory of 4812 2040 0f4b679d7cb344ac303b2b394a2fda68.exe 94 PID 2040 wrote to memory of 4812 2040 0f4b679d7cb344ac303b2b394a2fda68.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4b679d7cb344ac303b2b394a2fda68.exe"C:\Users\Admin\AppData\Local\Temp\0f4b679d7cb344ac303b2b394a2fda68.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\rbulecyzmfe.exe"C:\Users\Admin\AppData\Local\Temp\rbulecyzmfe.exe" qxkuzwbxm2⤵
- Executes dropped EXE
PID:4812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD50f4b679d7cb344ac303b2b394a2fda68
SHA1f86efc64c21a2a8ee6156f43b12b1cdf39cedbdc
SHA2561dfcb8c642765fef770f5119763f81438a28ade367520184581d0b71a7c3e525
SHA51232df9e4c4e1da79c4bc645455faa5676aecd8e3a8ec507d9c4a787e83d9e62e08e5b11e12d4cdafa34672fa9f0a30ad3c6ef844cf9fb60b623c3a3590b7701a6