Analysis
-
max time kernel
142s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
510066dbf65a2ff9f92410b478dbdade.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
510066dbf65a2ff9f92410b478dbdade.exe
Resource
win10v2004-20231215-en
General
-
Target
510066dbf65a2ff9f92410b478dbdade.exe
-
Size
14KB
-
MD5
510066dbf65a2ff9f92410b478dbdade
-
SHA1
d7c3c3c40c4cb138d0e487c1e61176149086bb22
-
SHA256
4a097b5822862dfa2c339ecb61b2d3e97d9609152c9df55aebeb0d9abb6ce634
-
SHA512
c9a30bb1a39260676ea51407f2a2eac066ecbdca6f025344c1e45e5deabf2051f268ff8d2b4c837d9af4d2ab08c542db0aa835a3c011a1d96bf5de4c5ee94729
-
SSDEEP
384:QLcTQvmFzKbE+QwuC6WREiHQqYBkUn/8yIYNM22:QqQmFL+QMC9B1QYJ2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 510066dbf65a2ff9f92410b478dbdade.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation fcbnaf.exe -
Executes dropped EXE 1 IoCs
pid Process 1828 fcbnaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1828 1140 510066dbf65a2ff9f92410b478dbdade.exe 92 PID 1140 wrote to memory of 1828 1140 510066dbf65a2ff9f92410b478dbdade.exe 92 PID 1140 wrote to memory of 1828 1140 510066dbf65a2ff9f92410b478dbdade.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\510066dbf65a2ff9f92410b478dbdade.exe"C:\Users\Admin\AppData\Local\Temp\510066dbf65a2ff9f92410b478dbdade.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD570e7a1cb835b4e867bf7d82a5e0c350f
SHA1324e5921795ac6df3198abbd1506f420ba24aff6
SHA25646cb17dbe8f22780374631f34ab583d6753ed80e3bb5a6b7cf9e8c983d55518d
SHA5125c25a49817319fa3c5ace1115c678d4f999b62cd1c0d4e86f32da9f3cb63ca76ae929017e9a2b7051498d48cf60f66ea96bd215234799b059759c2baf789b5a3