Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:01
Static task
static1
Behavioral task
behavioral1
Sample
1536f029eee015deb667ff19244a6136.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1536f029eee015deb667ff19244a6136.exe
Resource
win10v2004-20231215-en
General
-
Target
1536f029eee015deb667ff19244a6136.exe
-
Size
73KB
-
MD5
1536f029eee015deb667ff19244a6136
-
SHA1
4d49a5a2a0f641f52dfd01867d0c957b7233c78e
-
SHA256
5c56fc1ca2f777f59d8bb717437c594a5f7887f97e238c2ace20b8baf5bd1dd5
-
SHA512
3f649ee84885e6dea813de94c416821a8515c58214986a264c8228467877f52fd919f64bd68fe2b86fed5fdc9863ae5ee10dcf8c8054db95982600e36b20d4b6
-
SSDEEP
768:w4W1+KhWjmS7+w5/boHCAP3bOKehbzimqxUbUMbLQaFA5q+NT0S:XsBh4d56P3bO9zd50csq+mS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 1536f029eee015deb667ff19244a6136.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000_Classes\Local Settings 1536f029eee015deb667ff19244a6136.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1148 wrote to memory of 440 1148 1536f029eee015deb667ff19244a6136.exe 91 PID 1148 wrote to memory of 440 1148 1536f029eee015deb667ff19244a6136.exe 91 PID 1148 wrote to memory of 440 1148 1536f029eee015deb667ff19244a6136.exe 91 PID 1148 wrote to memory of 4540 1148 1536f029eee015deb667ff19244a6136.exe 97 PID 1148 wrote to memory of 4540 1148 1536f029eee015deb667ff19244a6136.exe 97 PID 1148 wrote to memory of 4540 1148 1536f029eee015deb667ff19244a6136.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1536f029eee015deb667ff19244a6136.exe"C:\Users\Admin\AppData\Local\Temp\1536f029eee015deb667ff19244a6136.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\×èò.txt2⤵PID:440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\1536f029eee015deb667ff19244a6136.exe" >> NUL2⤵PID:4540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5fb09ea925526813888b9f9be6c6c6b77
SHA1047a3bf2f74349ee659d2164276ca6bc11cffd66
SHA2561d280f1d5e85a39ce9b04dfbd58c1d0102d20b5bac6496950f421908c7129b21
SHA5123fc81ed7ddf29c1636c9e051f8d8e579e72dd5f5c403d2156c166fc4f569367d7163418f34571511686d9db6e9c61c20f4a8a3cf9478d74bc73a27bdd7e36343