Analysis
-
max time kernel
163s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
54728c7189ca4f9ff80e5f9153019c73.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54728c7189ca4f9ff80e5f9153019c73.exe
Resource
win10v2004-20231215-en
General
-
Target
54728c7189ca4f9ff80e5f9153019c73.exe
-
Size
404KB
-
MD5
54728c7189ca4f9ff80e5f9153019c73
-
SHA1
429c97cb9ed8d624ca0116b6fff4b55cf8fd6009
-
SHA256
f1426cb27a13693ca2a6a85f89863dbf403ff538ba9e4c266971f667032c7c5f
-
SHA512
d3aaa63d23c81deec4deaba589ad5571d9f7d273e0fba35364d69f8b888ee78371cc970a8eb8c7e40c1b0c7aa1fa6d17b2b953e16ed724e269144e98bcff30e9
-
SSDEEP
6144:JlTLl/8YvVh4Kq4JQlMdVrmUgb8+0qDKMuyHsk:N0YH4KqNjnDnuIr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 54728c7189ca4f9ff80e5f9153019c73.exe -
Executes dropped EXE 3 IoCs
pid Process 2336 The Boy In The Striped Pyjamas[2008]DvDrip-aXXo45427 [Online Working Keygen].exe 4156 7za.exe 716 ic1.exe -
Loads dropped DLL 1 IoCs
pid Process 4224 54728c7189ca4f9ff80e5f9153019c73.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 The Boy In The Striped Pyjamas[2008]DvDrip-aXXo45427 [Online Working Keygen].exe 2336 The Boy In The Striped Pyjamas[2008]DvDrip-aXXo45427 [Online Working Keygen].exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4224 wrote to memory of 2336 4224 54728c7189ca4f9ff80e5f9153019c73.exe 91 PID 4224 wrote to memory of 2336 4224 54728c7189ca4f9ff80e5f9153019c73.exe 91 PID 4224 wrote to memory of 2336 4224 54728c7189ca4f9ff80e5f9153019c73.exe 91 PID 4224 wrote to memory of 4156 4224 54728c7189ca4f9ff80e5f9153019c73.exe 92 PID 4224 wrote to memory of 4156 4224 54728c7189ca4f9ff80e5f9153019c73.exe 92 PID 4224 wrote to memory of 4156 4224 54728c7189ca4f9ff80e5f9153019c73.exe 92 PID 4224 wrote to memory of 716 4224 54728c7189ca4f9ff80e5f9153019c73.exe 94 PID 4224 wrote to memory of 716 4224 54728c7189ca4f9ff80e5f9153019c73.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\54728c7189ca4f9ff80e5f9153019c73.exe"C:\Users\Admin\AppData\Local\Temp\54728c7189ca4f9ff80e5f9153019c73.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\The Boy In The Striped Pyjamas[2008]DvDrip-aXXo45427 [Online Working Keygen].exe"C:\Users\Admin\AppData\Local\Temp\The Boy In The Striped Pyjamas[2008]DvDrip-aXXo45427 [Online Working Keygen].exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\7za.exeC:\Users\Admin\AppData\Local\Temp\7za.exe x C:\Users\Admin\AppData\Local\Temp\a1.7z -aoa -oC:\Users\Admin\AppData\Local\Temp -plolmilf2⤵
- Executes dropped EXE
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\ic1.exe"C:\Users\Admin\AppData\Local\Temp\ic1.exe"2⤵
- Executes dropped EXE
PID:716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5e92604e043f51c604b6d1ac3bcd3a202
SHA14154dda4a1e2a5ed14303dc3d36f448953ff6d33
SHA256fa252e501332b7486a972e7e471cf6915daa681af35c6aa102213921093eb2a3
SHA512ef396d94d83fd7a588c6e645ea5fcfe24390440a03b3bf0ecd05ca6749fd3f9561dfafe725ee0edea51a34d52af26cd311e768aa72f75686cc796abee4757d43
-
C:\Users\Admin\AppData\Local\Temp\The Boy In The Striped Pyjamas[2008]DvDrip-aXXo45427 [Online Working Keygen].exe
Filesize162KB
MD5451fb9c434da73bcaa37bfc6864fcc37
SHA1b22e2e79383caef2fcb9b0841215ce735e7914fa
SHA25699a6c296349bf9261a3f6a7266b41f85831f2379c985dd1fc4b33c0d8dc1ad5e
SHA512263af9b2aa5fdb8946720e960e7682f85099df490179b39f874086d0956742be4fd695d044672db72c7c5b8a05d031f7d40a6738a02b597ad183613ab881c24b
-
Filesize
7KB
MD5fe1a3c6046eaa4de86b2f37d5d5d9fec
SHA1254d7411106436e9c583b21fb3aabd11665b4ad2
SHA256760db114cd6711fd8c5df7f0ddc7e0b641c8c585dbe199b4a316e726ed390c11
SHA5121ad719b52a294441c101e1d40babc8dd4ea0d39286d93d3047d024a1590f8e48ccff556bea5469eb1713294b04760ee656f627d4876a9cdf657eadf87a00b0fc
-
Filesize
18KB
MD5b64b538899d4588a05d7d3db92918448
SHA1b2d0b29a9c69bac6b22f696474eb031cca664f9a
SHA256803abec016d53636f2817c972f2c769beb36501fc8bd30c73994958eb94cfb29
SHA512ba4732c7a25dfdd636009a5ec8597e233c7c2b736b9c08a07dce13de70d9e0e08652b7f323ab590a29b57da12bf6a347675b2103bdfef06a80dbfd555ad09727
-
Filesize
5KB
MD5a7cd6206240484c8436c66afb12bdfbf
SHA10bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919
SHA25669ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926
SHA512b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904