Analysis
-
max time kernel
174s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
4235680f091bbca80266f80bffb290c4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4235680f091bbca80266f80bffb290c4.exe
Resource
win10v2004-20231215-en
General
-
Target
4235680f091bbca80266f80bffb290c4.exe
-
Size
47KB
-
MD5
4235680f091bbca80266f80bffb290c4
-
SHA1
a52b1fd61a6dae0c782ebafc69023fcca1f3023d
-
SHA256
3f44ddf7b8cb6b5a145f635d5c5316f08351a99b60bd53a915ec6cf6b587c314
-
SHA512
f22680925f0a5eaaa1d30614c0d5a9239bae133178322cf7435c44b1ccdd4389f27f6764f3d07f2d0fcf124dee0a3d773e97f0283bd6e2dd6ace74706a6380b7
-
SSDEEP
768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxm:24Bobv7aB0EooYEC3rUVcYm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 4235680f091bbca80266f80bffb290c4.exe -
Executes dropped EXE 1 IoCs
pid Process 3336 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 3336 396 4235680f091bbca80266f80bffb290c4.exe 91 PID 396 wrote to memory of 3336 396 4235680f091bbca80266f80bffb290c4.exe 91 PID 396 wrote to memory of 3336 396 4235680f091bbca80266f80bffb290c4.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4235680f091bbca80266f80bffb290c4.exe"C:\Users\Admin\AppData\Local\Temp\4235680f091bbca80266f80bffb290c4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:3336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5b9f246a9ad10110a93fcbab658f2a81d
SHA11873164bcc6a36d66b9712f43d323b0209c7cc16
SHA2568a4e2c9fc6eb78a4a9e8c998f29f8564f5c2f5607f91bb4f942adda8a372f9fb
SHA512037fc5b9b36c66646cb48f4acd250147ce494bb0798026541e1462568b8164a473fbdf0665903252cc53e3958b109d0ffa793d043093e408cb515580b156775f