Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
4c8740d02ff09cb44689e1d2944f8000.exe
Resource
win7-20231215-en
General
-
Target
4c8740d02ff09cb44689e1d2944f8000.exe
-
Size
448KB
-
MD5
4c8740d02ff09cb44689e1d2944f8000
-
SHA1
a43c106c69bd4574b6b0d31d3c26ce87c3cbc4e7
-
SHA256
edb1bd2a98fb5945f5ee5602b8ca496752d7adeb30f4a15243a9f5d311ae9e5f
-
SHA512
f4f8f75a3c0d2546b3f3f909f41ed1b46f467d55fa91e8f3ee52dbffd14ebfbf8cfe8d2a60eea630a470a966241d51c7906b7fac6e72a24238602ef8f30dcd74
-
SSDEEP
12288:p0m3blK36QhuIOyFHxlAaO8ye3/RuXg4:93blO6NWTlAaO8yd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 4c8740d02ff09cb44689e1d2944f8000.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 4232 2200 4c8740d02ff09cb44689e1d2944f8000.exe 90 PID 2200 wrote to memory of 4232 2200 4c8740d02ff09cb44689e1d2944f8000.exe 90 PID 2200 wrote to memory of 4232 2200 4c8740d02ff09cb44689e1d2944f8000.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c8740d02ff09cb44689e1d2944f8000.exe"C:\Users\Admin\AppData\Local\Temp\4c8740d02ff09cb44689e1d2944f8000.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Run [1].bat" "2⤵PID:4232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD546b131684a6a4e3f59d7ff2aaa376d96
SHA1d7ba21dd6be5f85c4b33f49df0bab2bb208518f2
SHA256e2fdea2531b6d405755674ef72934b94b1a204540cc7961f5442aa330e682260
SHA512aa9ceed1d452a7b6a96249d9a7a7cf53c6095932f47781c2a891a360a98043ce881a0e0e4eb9d084148f054982590747157239826d4a9d768649c4bfd28677ab