Analysis
-
max time kernel
156s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
18bf9f1007847fcf1eb3a0e562c41a8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18bf9f1007847fcf1eb3a0e562c41a8f.exe
Resource
win10v2004-20231215-en
General
-
Target
18bf9f1007847fcf1eb3a0e562c41a8f.exe
-
Size
49KB
-
MD5
18bf9f1007847fcf1eb3a0e562c41a8f
-
SHA1
aa8e749d42d112a6e31e374895ecda55bd421cda
-
SHA256
1385e7c83bf4c725e736ea517b327897d31591d7b03600aa76eba99707ab4c94
-
SHA512
0a7d4740bd77608bed7d02b0955485f1c10e979250250d6a04865e885eb11fe4be6ab24247fbdc215cd00f401c1adaa531f567f7a72eac3a3e742f135a9d0e5c
-
SSDEEP
768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxgrs6:24Bobv7aB0EooYEC3rUVcYgw6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 18bf9f1007847fcf1eb3a0e562c41a8f.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2728 1632 18bf9f1007847fcf1eb3a0e562c41a8f.exe 97 PID 1632 wrote to memory of 2728 1632 18bf9f1007847fcf1eb3a0e562c41a8f.exe 97 PID 1632 wrote to memory of 2728 1632 18bf9f1007847fcf1eb3a0e562c41a8f.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\18bf9f1007847fcf1eb3a0e562c41a8f.exe"C:\Users\Admin\AppData\Local\Temp\18bf9f1007847fcf1eb3a0e562c41a8f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5f1d278b19205d1210a3b8e745aed71ef
SHA152453540aa09fd01647c5fb86de50f7eed82d446
SHA256d46354e8d8224665bf245402cbb0bafaacbbdf6a1af90b5b8486da83b8f37c51
SHA512730a3a7f48b4b48a246779ebfecaab45857da972287d639ab4f10bcebc223d5178dbe129b9b10cd2ca245ccf532078dcb773483359f589eb69f17f7e572d5fc6