Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:16
Behavioral task
behavioral1
Sample
4fae508b75e4b2deb7ebdda0f4e0d354.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4fae508b75e4b2deb7ebdda0f4e0d354.exe
Resource
win10v2004-20231215-en
General
-
Target
4fae508b75e4b2deb7ebdda0f4e0d354.exe
-
Size
86KB
-
MD5
4fae508b75e4b2deb7ebdda0f4e0d354
-
SHA1
101443946a937efa1a19fdcfdf578fbc03fe70c9
-
SHA256
8485e56034da5284fb35947c22c56f3b37fadfa00bb1eeb1bee48f1e414d40c2
-
SHA512
a1df87380bba459a1f69762d7049979df341235ea2d63603d95254b30058c07359dd481bbb21057deb8f0722ccb10849e6602274e41fd89777530262ebc4c153
-
SSDEEP
1536:x2wKdrjIBV6Ba+GYUPivILrNok9rme/uQkXYAqc7:x2bjLBa1YU6vYDce/uQeYAq4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 4fae508b75e4b2deb7ebdda0f4e0d354.exe -
resource yara_rule behavioral2/memory/4380-0-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4380-2-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1668 4380 4fae508b75e4b2deb7ebdda0f4e0d354.exe 24 PID 4380 wrote to memory of 1668 4380 4fae508b75e4b2deb7ebdda0f4e0d354.exe 24 PID 4380 wrote to memory of 1668 4380 4fae508b75e4b2deb7ebdda0f4e0d354.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fae508b75e4b2deb7ebdda0f4e0d354.exe"C:\Users\Admin\AppData\Local\Temp\4fae508b75e4b2deb7ebdda0f4e0d354.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\4585.tmp.bat" > nul 2> nul2⤵PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD58ff93e29fcc0ef50bbddf73818029057
SHA1ab13f304361f2722a3d03ec3b36c1e45fdf76807
SHA256013b62d8c8fa1352ef17bb9fabd9307edadb112506f753f1f67785b0a230640b
SHA51267d41d2b38a1ce5e381fc4623b61125f8648416ccff2a3830929f2729ecf014d8cd5134d0b6d24f601d59fcec44f74c5f45b69ac576b316243e911d987db0f04