Analysis
-
max time kernel
194s -
max time network
231s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe
Resource
win10v2004-20231215-en
General
-
Target
95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe
-
Size
16.4MB
-
MD5
3c6a3d45da15c9cb5d5d7a86d25efbed
-
SHA1
24f723cab4ec50d8f546fcf3a340070a3f81a27a
-
SHA256
95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a
-
SHA512
8b5ede22dcbec58736b835ebce8854d012441f3dea0d0815e91091a5c4ca657d7a4d256bc91df8b925a2a370839b5fd97c8b5fdf7cb74bbf34405e06ef1c2491
-
SSDEEP
49152:8f4iXn3IPNBwr8b49LB0fflDpCUWffuxuFUSO9N8TUllCRYhMZ8qgWkHU6wsUKkb:8AG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 4084 timeout.exe 2596 timeout.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1840 1008 95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe 93 PID 1008 wrote to memory of 1840 1008 95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe 93 PID 1008 wrote to memory of 1840 1008 95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe 93 PID 1840 wrote to memory of 2596 1840 cmd.exe 94 PID 1840 wrote to memory of 2596 1840 cmd.exe 94 PID 1840 wrote to memory of 2596 1840 cmd.exe 94 PID 1840 wrote to memory of 4084 1840 cmd.exe 95 PID 1840 wrote to memory of 4084 1840 cmd.exe 95 PID 1840 wrote to memory of 4084 1840 cmd.exe 95 PID 1840 wrote to memory of 4076 1840 cmd.exe 98 PID 1840 wrote to memory of 4076 1840 cmd.exe 98 PID 1840 wrote to memory of 4076 1840 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe"C:\Users\Admin\AppData\Local\Temp\95dd8934771ad27944b8ac57ad036c02c445005454dedfd61c4437089a29027a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5EA2.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2596
-
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4084
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\\PolyGraph, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null3⤵PID:4076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298B
MD5506fe909a6cc30472038e5ef3afe9253
SHA150f40b7e16eac1cc19ed51ee7b4eef928089201c
SHA2568056b57379e8ee62797f55847ab8cef591582d70b9ec93f80af1c4a42f01ed2c
SHA51288ae587500edac79721ca15ce78d444312b0db062c245aa31900bac7b1576a4060edcb46c6ec422d9102448805527d8415fd2df2ed55a0f1113a353681814f67