Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
442f2ae4c67846c929b9c6737ab02c8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
442f2ae4c67846c929b9c6737ab02c8b.exe
Resource
win10v2004-20231222-en
General
-
Target
442f2ae4c67846c929b9c6737ab02c8b.exe
-
Size
199KB
-
MD5
442f2ae4c67846c929b9c6737ab02c8b
-
SHA1
ba41ce9cf487089303d4d7f0296e1d5aa3131dac
-
SHA256
7e4306d6e78369ea5b6285e77fd57c933c34ed1df1733a836eaef985aef693f2
-
SHA512
f06bee1f5c122b8c1f3a667001c64dbefc9907229708b9be947a7e8ad6b1f322805a8268010f36266c363d9d4af1046145970ce6145aef485286f7b52003f10c
-
SSDEEP
3072:Y6MPI1XAlckwoLptatPUjHHSfOYWPQzTpNI/PBtWbUCPLIYqhWHH1m3D/HDazx:Y6+/woVEyjHHSfOizdN6QUCPchUMzWz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 442f2ae4c67846c929b9c6737ab02c8b.exe -
Executes dropped EXE 1 IoCs
pid Process 940 Crypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3720 wrote to memory of 940 3720 442f2ae4c67846c929b9c6737ab02c8b.exe 48 PID 3720 wrote to memory of 940 3720 442f2ae4c67846c929b9c6737ab02c8b.exe 48 PID 3720 wrote to memory of 940 3720 442f2ae4c67846c929b9c6737ab02c8b.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\442f2ae4c67846c929b9c6737ab02c8b.exe"C:\Users\Admin\AppData\Local\Temp\442f2ae4c67846c929b9c6737ab02c8b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\ProgramData\Crypted.exe"C:\ProgramData\Crypted.exe"2⤵
- Executes dropped EXE
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5e1cd7fd62df3c4bf4d686e5bd00bdd0e
SHA18345814efc535d1b275787f366af8e30730e2bf3
SHA256b4f97e2a687b6acff606ced628893b60b639d4560be5c1a53d58fdac6ed29b9b
SHA5121473811c8e8fb888001a3af24a31f81fba7f6c16ce869dafdc4b8bffad50c83d3528fbab91e4644a522283855ed8b3658c75e7adc2387ff2930693eee30033aa