Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
558279918b7188327de83ea39800ec67.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
558279918b7188327de83ea39800ec67.exe
Resource
win10v2004-20231215-en
General
-
Target
558279918b7188327de83ea39800ec67.exe
-
Size
48KB
-
MD5
558279918b7188327de83ea39800ec67
-
SHA1
deca5856f87f766faa4caa102c119d9752e91584
-
SHA256
2eb769c49bd1048edc3a5fe28641ffc06f55dd03d54c45a0359e7e4ecd1c0788
-
SHA512
6c6074285b908cc3997b884eaf8f5758927aa71d7a9280d3246d41a3a8b32d81bb3749e2fd0ddae17b87c28ef2a6eb92da3e9df769610221b581e9169384bf9a
-
SSDEEP
768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxr:24Bobv7aB0EooYEC3rUVcYr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 558279918b7188327de83ea39800ec67.exe -
Executes dropped EXE 1 IoCs
pid Process 3312 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 996 wrote to memory of 3312 996 558279918b7188327de83ea39800ec67.exe 21 PID 996 wrote to memory of 3312 996 558279918b7188327de83ea39800ec67.exe 21 PID 996 wrote to memory of 3312 996 558279918b7188327de83ea39800ec67.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\558279918b7188327de83ea39800ec67.exe"C:\Users\Admin\AppData\Local\Temp\558279918b7188327de83ea39800ec67.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:3312
-