Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
41f4d90d426e2f21c80b57bcd99e384c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
41f4d90d426e2f21c80b57bcd99e384c.exe
Resource
win10v2004-20231222-en
General
-
Target
41f4d90d426e2f21c80b57bcd99e384c.exe
-
Size
138KB
-
MD5
41f4d90d426e2f21c80b57bcd99e384c
-
SHA1
8387d670b82c2212cef1450388673d80ea7b1386
-
SHA256
5af3ef5c6562097f2cc6a7050f6e263652d97d08fe29b8fe8fa200421b68ee65
-
SHA512
4fd2fce182fc5a3a70ade6d606f89759bfbce03dded7ead5392ae0c225bbc5b97cc169134d6f54f48aa56127b217e8f4266a747025c758c959cab3c01ce0a087
-
SSDEEP
1536:hB1dlgRwgoY9ef3p81UFz2PEnm5YoNoz4BUoNBealHf0lCYCEk:b1dlKwgj23+Oz05YoNozW3NBP/hYCl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 41f4d90d426e2f21c80b57bcd99e384c.exe -
Executes dropped EXE 1 IoCs
pid Process 3820 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3820 server.exe 3820 server.exe 3820 server.exe 3820 server.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3820 4912 41f4d90d426e2f21c80b57bcd99e384c.exe 90 PID 4912 wrote to memory of 3820 4912 41f4d90d426e2f21c80b57bcd99e384c.exe 90 PID 4912 wrote to memory of 3820 4912 41f4d90d426e2f21c80b57bcd99e384c.exe 90 PID 3820 wrote to memory of 3628 3820 server.exe 35 PID 3820 wrote to memory of 3628 3820 server.exe 35 PID 3820 wrote to memory of 3628 3820 server.exe 35 PID 3820 wrote to memory of 3628 3820 server.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\41f4d90d426e2f21c80b57bcd99e384c.exe"C:\Users\Admin\AppData\Local\Temp\41f4d90d426e2f21c80b57bcd99e384c.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Extracted\server.exe"C:\Extracted\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD58b5f0f935f2fff261fc4ab56f0b1287e
SHA12a833245300134736e1af7e43cb47384e214a31b
SHA256aec9a33dc94fc6758a16b532e02c87e8c53593cf185427cef55b21bf5df6d8c7
SHA512eb06049e561d5565b1432df120d3e04ccbd54587bb3a4a98670007a2f410f3e001dc3e35ab08d63242f9ed65591d871973938453aee7cba4ddc5632b99872a5f
-
Filesize
212B
MD54043f21372dabcb54fb577190280e7d1
SHA11cf9ac7c9cbf8e0472cb3e147043271a558b9dbf
SHA256ff4da7dc53376c7fade6e4762af32589cd2df23876b4739575f154893c36b58e
SHA51262a5394fb435f91c890d31130e63cb86b11e641f1f58c987d55e23da03cc857d02f4ea51770206cfd5bbfdce25a18658b7dbe1423487ef20bf7a7b9d5e91a04e