Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
1337cded11ed38a6116c38a4701027d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1337cded11ed38a6116c38a4701027d6.exe
Resource
win10v2004-20231215-en
General
-
Target
1337cded11ed38a6116c38a4701027d6.exe
-
Size
284KB
-
MD5
1337cded11ed38a6116c38a4701027d6
-
SHA1
2227d2a27af8f8e150ecc4c06de206ca612523dd
-
SHA256
4f014748bdc0f0b604c411460d04bc342061bd561e041b90a58e1547682f7244
-
SHA512
6867f4592288372988b980b0d5c95d9cccf9bbd6d51204508492b8bf261d4e2f5bdbc67cf4ee44093b151eacf06dddd1d3403bf90d80154a03de64961d000db3
-
SSDEEP
6144:4nFYTcANLe0aOk1tkTMkonIVfErSTxQzyM9y+6FwcLTVDxQE1Uyl:4CTcZLOk1tkTMRUfnweTVDeEGG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 1337cded11ed38a6116c38a4701027d6.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 1337cded11ed38a6116c38a4701027d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4152 2808 1337cded11ed38a6116c38a4701027d6.exe 89 PID 2808 wrote to memory of 4152 2808 1337cded11ed38a6116c38a4701027d6.exe 89 PID 2808 wrote to memory of 4152 2808 1337cded11ed38a6116c38a4701027d6.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1337cded11ed38a6116c38a4701027d6.exe"C:\Users\Admin\AppData\Local\Temp\1337cded11ed38a6116c38a4701027d6.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" c:\4c16f350-c8cb-4ef3-b348-8a3b7673e689\start.hta2⤵PID:4152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD58759f10573430722009470731babfa04
SHA1394b6e05145a8ab36a0a1d445b46511d729c7b18
SHA256147f1dd5d69e4eee40c77a5198268b2071b3d234b193bd5ce531aeac26ab1da4
SHA512aa1f0749e79e3f7da07ee059d183412950999738b5c986670a293c71babf2f23a2ca2757b9ec5a9e492c44ee4e0bbd9703ddd3a9f2ac60267397c196e3a2865f
-
Filesize
93KB
MD5170fab33daa7d6e62c6592969723235b
SHA1b78953ed3bb1f7cabcfc982a662137ecc827fba6
SHA2568d810563badfd0ae6ba24275e6a0b7e3bd2688ea40551a48f9a8e19aa49092ec
SHA512f0de4257557f451fa03a453c28b660188b01c8643a794ce4678f7306e9452c16a11c4110b8975677fde78e4c41a5b5746b3b84f52b485055cfcd70ff4df2cce4
-
Filesize
1KB
MD5e88ebd85dd56110ac6ea93fe0922988e
SHA1684a31d864d33ff736234c41ac4e8d2c7f90d5ae
SHA256379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb
SHA512211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7
-
Filesize
1KB
MD5db4ada697fa7a0e215281533d52578e9
SHA1fb755ea8371edf5065dc53e21eb413603f9eba7f
SHA256f949fd6ca734830572128b4348dfd039419140c7ef501d80773f71ca3f0ed78c
SHA5129ba1d2658785dd3c88b4399132f8330dc58872235e19ca9854b0e453d8cc7a58de0c8be84da376a72b5851073f531c95b2c6afa84f43053561ca8e6751d6e2f3