Analysis
-
max time kernel
1s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
3ba0db033c249226b68206784b9fa0bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ba0db033c249226b68206784b9fa0bc.exe
Resource
win10v2004-20231215-en
General
-
Target
3ba0db033c249226b68206784b9fa0bc.exe
-
Size
3.7MB
-
MD5
3ba0db033c249226b68206784b9fa0bc
-
SHA1
65bad6473305b3418d13a98686c81166bc9c07d4
-
SHA256
c27a17d0ecd333aa1e08a2162020a317d25557e113ff70decedacfcf0ca2c3e8
-
SHA512
768eb2ec8421fa9894fbb750a842da329b6486d2d305a0046e1185d44f2dae985d86d9af8c65b291bb961e2a571c2089e0e0390578af46c7e33ff133ac34e693
-
SSDEEP
98304:CsembqxwNbYKdMBcUtwpX35U/qEhzKDqEz35HA9zIovKz3Kxy:bYBcUapn5U/qIzol3Cz0z6xy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 3ba0db033c249226b68206784b9fa0bc.exe -
Executes dropped EXE 1 IoCs
pid Process 868 2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\2.exe 3ba0db033c249226b68206784b9fa0bc.exe File created C:\Windows\1.wav 3ba0db033c249226b68206784b9fa0bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 868 4844 3ba0db033c249226b68206784b9fa0bc.exe 32 PID 4844 wrote to memory of 868 4844 3ba0db033c249226b68206784b9fa0bc.exe 32 PID 4844 wrote to memory of 868 4844 3ba0db033c249226b68206784b9fa0bc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ba0db033c249226b68206784b9fa0bc.exe"C:\Users\Admin\AppData\Local\Temp\3ba0db033c249226b68206784b9fa0bc.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
PID:868
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Windows\1.wav"2⤵PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54712561a4cbc5a40ee5060f5abad2d80
SHA1e07482f4e8517cc75766bc364b3d85a3f9d28c5a
SHA2566018a18b9055f03f62334f5a907fddbd40a60f791fe6fc269eab5aed245c83ad
SHA51253e7812642d68caed40856cfcf8a10befc3da6e01edab16e06f8e3b11f373f1da9043bf04e2ca7b74f6aecc23567154112667faba0b9ad9f68d14b940308e057