Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 15:07
Behavioral task
behavioral1
Sample
56c9b2b940c2db8cbdc3f185ba4b538e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56c9b2b940c2db8cbdc3f185ba4b538e.exe
Resource
win10v2004-20231215-en
General
-
Target
56c9b2b940c2db8cbdc3f185ba4b538e.exe
-
Size
28KB
-
MD5
56c9b2b940c2db8cbdc3f185ba4b538e
-
SHA1
11284e2c3c42cc982074dc779cab9a3d4363db28
-
SHA256
c0b9eaec2096b9d652f43f5ca92b8b6c2e500c972454e651b1ae1b7e1ca97d8e
-
SHA512
49b415c11a44900a59512e405254b3d608c967f08f2d6db73b3f9e9587a6a3a9d2a30698e2ad0ca310a00aa4a03cda11999324521ad49aa1656e40ec81183226
-
SSDEEP
768:b5/gNRhBWhue9mJhhjqe/dnp+VpwzXOiDUaurrM:N/XuKmfpqeVp+KXPUX/M
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 56c9b2b940c2db8cbdc3f185ba4b538e.exe -
resource yara_rule behavioral2/memory/1452-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/1452-3-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4696 1452 56c9b2b940c2db8cbdc3f185ba4b538e.exe 91 PID 1452 wrote to memory of 4696 1452 56c9b2b940c2db8cbdc3f185ba4b538e.exe 91 PID 1452 wrote to memory of 4696 1452 56c9b2b940c2db8cbdc3f185ba4b538e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c9b2b940c2db8cbdc3f185ba4b538e.exe"C:\Users\Admin\AppData\Local\Temp\56c9b2b940c2db8cbdc3f185ba4b538e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵PID:4696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5882c90090b3a24692707433be79720c3
SHA18984e40f9868c37634db27b1a70c86cd17137b15
SHA256e4bbb5aa724548b362b95006004dc5a81d7105315aa00a535cfb3ce19d594634
SHA5128f773d46724bceb3e9ff1a52fe9eed4baab74f77df9eda655ea7208124d1529033f14b7b27a10ce12993d4ccdd9670a57b479d826c0a588cfc63a79931c10be7