Analysis
-
max time kernel
4s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
4b0371d992eb9ffc4681258ce8cc2c49.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b0371d992eb9ffc4681258ce8cc2c49.exe
Resource
win10v2004-20231215-en
General
-
Target
4b0371d992eb9ffc4681258ce8cc2c49.exe
-
Size
195KB
-
MD5
4b0371d992eb9ffc4681258ce8cc2c49
-
SHA1
1d3e1bd367513d7b92c07c180156ea5d45fdb4cc
-
SHA256
74f7f30e36d60b1c307a5b26b5370b5fe16ba6386b30fb39495b32e731c2fcd8
-
SHA512
bed98b200e9ffb1735283cefacff0fb5f703244eacc5ed1288f0c410a7d90c30c25d05dd928475ebd3e729971b06ffec01641668114963a5ae249634eb93edb7
-
SSDEEP
3072:OdDWmr3eifwGQ7d2mk7B9k9HXnOY33G3IjMwnLiskmhKQZT3eiw:4Z3eiBamnk5Xn7G32P+s1MQZT3ei
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 4b0371d992eb9ffc4681258ce8cc2c49.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3376 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2968 PING.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 488 4892 4b0371d992eb9ffc4681258ce8cc2c49.exe 90 PID 4892 wrote to memory of 488 4892 4b0371d992eb9ffc4681258ce8cc2c49.exe 90 PID 4892 wrote to memory of 488 4892 4b0371d992eb9ffc4681258ce8cc2c49.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b0371d992eb9ffc4681258ce8cc2c49.exe"C:\Users\Admin\AppData\Local\Temp\4b0371d992eb9ffc4681258ce8cc2c49.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 4892 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4b0371d992eb9ffc4681258ce8cc2c49.exe" & start C:\Users\Admin\AppData\Local\BDYJMB~1.EXE -f2⤵PID:488
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 48923⤵
- Kills process with taskkill
PID:3376
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2968
-
-
C:\Users\Admin\AppData\Local\bdyjmbpyk.exeC:\Users\Admin\AppData\Local\BDYJMB~1.EXE -f3⤵PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD501981184bc065002357d2905070fbf5b
SHA190c416b80f476b4500d54602aabd0bd6fe3211d9
SHA256b1bde38ca76f19de923b8b17c4204c41161e4895518ff955ec1c0e59532b8c6e
SHA512dd1866fc89ab0add1839d900f4ac0e26f89301240cc3b209eadf96dfc5a342fca895579a9010672dca0d5ee3f125a7853aa3852cb3d390b656d1d411fc1de9af
-
Filesize
28KB
MD595ede2b8cb30fa84bb2e5455b891e9c2
SHA198ae7e8494671bd995e7f437a96b52e3e404d279
SHA25607f458d6bb0a7ccd12ab60b5433b76db1d0d844e4ec1fe8c7f4f3e77948c1df6
SHA51220f42b424d845241c1bd54f0bf5d7f9df2026155c65e99955116d0035fc45870e13d20eb4515b524b9f0d04315e6af4ae11b38c7617d230aadeb720ad8d44ecf
-
Filesize
195KB
MD54b0371d992eb9ffc4681258ce8cc2c49
SHA11d3e1bd367513d7b92c07c180156ea5d45fdb4cc
SHA25674f7f30e36d60b1c307a5b26b5370b5fe16ba6386b30fb39495b32e731c2fcd8
SHA512bed98b200e9ffb1735283cefacff0fb5f703244eacc5ed1288f0c410a7d90c30c25d05dd928475ebd3e729971b06ffec01641668114963a5ae249634eb93edb7