Analysis
-
max time kernel
183s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 08:01
Static task
static1
Behavioral task
behavioral1
Sample
12e2e3896b34c59c90b436e3245d80ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12e2e3896b34c59c90b436e3245d80ff.exe
Resource
win10v2004-20231215-en
General
-
Target
12e2e3896b34c59c90b436e3245d80ff.exe
-
Size
42KB
-
MD5
12e2e3896b34c59c90b436e3245d80ff
-
SHA1
764b2be5323ef6f66cf2614d4a6f50a2f0a85691
-
SHA256
cd4f6b784e998bb2d3a466a4c5c851338d640ac3fe12e2dac5bcffd23cae665d
-
SHA512
e85c69ebd8b00e717e46aa66cc5a24bb0e0a21df05414e44b4abc054dbc8e0df769541afb80a5b05ef59a7745e672b90bcfe329fdcb99b7e6b946f3a84458dce
-
SSDEEP
768:cHwPmlu0S9A/e8xCJr3SEr8xo1pKDElDhIUfWK2LKZ2NxCXCJGD34SXeeP:c6mIh9AW8xCoQ8xMYDElDai2NYyehtP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 12e2e3896b34c59c90b436e3245d80ff.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 12e2e3896b34c59c90b436e3245d80ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 12e2e3896b34c59c90b436e3245d80ff.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\braviax.exe 12e2e3896b34c59c90b436e3245d80ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4640 4520 12e2e3896b34c59c90b436e3245d80ff.exe 93 PID 4520 wrote to memory of 4640 4520 12e2e3896b34c59c90b436e3245d80ff.exe 93 PID 4520 wrote to memory of 4640 4520 12e2e3896b34c59c90b436e3245d80ff.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\12e2e3896b34c59c90b436e3245d80ff.exe"C:\Users\Admin\AppData\Local\Temp\12e2e3896b34c59c90b436e3245d80ff.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "2⤵PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD539e9bd150ce80160d178ae6ee5aac680
SHA1e51c0724091f24345f9d75978650a29b1b00937f
SHA25677bb0f64c0247ce67a358bbe851bbc8d0f371a286d04240b6a46e8b5b556e758
SHA512fcfc11500a11049f5022480827de96c804752f3f7ac503d60d6d4ce33f1920a16c9aa86d90f5f75cbb4a2a98ee332c7f68d7f551c4211dd8b1439e0ed4a841d2