Analysis
-
max time kernel
114s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
418cdc0129aeb45f651882db4a748113.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
418cdc0129aeb45f651882db4a748113.exe
Resource
win10v2004-20231215-en
General
-
Target
418cdc0129aeb45f651882db4a748113.exe
-
Size
113KB
-
MD5
418cdc0129aeb45f651882db4a748113
-
SHA1
9f0604b1e365fe8a3aa73442698b0d0ba6d68d87
-
SHA256
ca3ca8e1e0a1dfcd5ec0c2b769c7fa8dd776a4bb8ad91a22fa51660c966d993c
-
SHA512
a2d34240cedceb10a0b658c9cd9f6a659c83bae7de0abb35da927ab07b8b029442613951c6ac9c646adf8bddd93538f0d43d9f44b1f64c8107157c61dfded2c7
-
SSDEEP
3072:2rqVGDY7OHmFMR6Hf5GhQQnP2L4R929ZRWO0bdclUBVXZ+vTGiyLaQo0zJqsgu9w:2rqVGDY7OHmFMR6Hf5GhQQnP2L4R929F
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 418cdc0129aeb45f651882db4a748113.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 916 418cdc0129aeb45f651882db4a748113.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 916 wrote to memory of 4540 916 418cdc0129aeb45f651882db4a748113.exe 92 PID 916 wrote to memory of 4540 916 418cdc0129aeb45f651882db4a748113.exe 92 PID 916 wrote to memory of 4540 916 418cdc0129aeb45f651882db4a748113.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\418cdc0129aeb45f651882db4a748113.exe"C:\Users\Admin\AppData\Local\Temp\418cdc0129aeb45f651882db4a748113.exe"1⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Lxv..bat" > nul 2> nul2⤵PID:4540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5b02afef9ea74de7fa219f9754ba0bbd1
SHA10d201d6daeda2dcc7a4dbe3e5019676034ae0cfc
SHA256335b929db2eb1a21192af833a774fa0364a38a761e3553ad05d0e382f4ddbfb6
SHA512ecba6037d3e33a82b33a9f19d3ffb07ca2df32cbb819b314147d5729cd4f69299a89ba5f12fc972894f612512186f0ae66318066052b167f7a7ea9db82f7d7a7