Analysis
-
max time kernel
105s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
6682bae4a5ebb9b21e092a0653e7b3be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6682bae4a5ebb9b21e092a0653e7b3be.exe
Resource
win10v2004-20231215-en
General
-
Target
6682bae4a5ebb9b21e092a0653e7b3be.exe
-
Size
110KB
-
MD5
6682bae4a5ebb9b21e092a0653e7b3be
-
SHA1
07061a35070b1a841ff8a2f46310d983b45f8d55
-
SHA256
4ddbdc34a18adb178274b6b4bbff7d01f1e980b30bf9e186a21b9fd27093d828
-
SHA512
eb3dfe36bbe308b6131b4f6404c196dcd9cb1b050929a7c851539b6632ae52e9ffcbc36da1afd397298d0861ba5fd0eab9d354e7855f5cc9a05caddac5f1524d
-
SSDEEP
1536:bmTdCCqS287V6LPEidmw8Yx7wV2Iy2e42Zukek3jPILTCaEViHoFIb:ypCCqS28K7+YGIx2X2Zu0jIEBFIb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 6682bae4a5ebb9b21e092a0653e7b3be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 6682bae4a5ebb9b21e092a0653e7b3be.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3340 wrote to memory of 5112 3340 6682bae4a5ebb9b21e092a0653e7b3be.exe 90 PID 3340 wrote to memory of 5112 3340 6682bae4a5ebb9b21e092a0653e7b3be.exe 90 PID 3340 wrote to memory of 5112 3340 6682bae4a5ebb9b21e092a0653e7b3be.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6682bae4a5ebb9b21e092a0653e7b3be.exe"C:\Users\Admin\AppData\Local\Temp\6682bae4a5ebb9b21e092a0653e7b3be.exe"1⤵
- Checks computer location settings
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ecj..bat" > nul 2> nul2⤵PID:5112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD53d932f8726b88d2c1c2075232cbc432f
SHA192f160fb9dcd78f84c1f1d8089480671bec8fbc1
SHA256cdf77e3c11b4914c10093026153a64c4e9d0e271304401450ce21b3c8dc736f7
SHA5122e22441a92fff6f6b1484ad3a3a877f9765357123f470ea9568286550896ea8c36a88d1ed593d0c661b5405ee685ce386c82f23e1dc58b3f23b52e5f92e0c484