Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
675202e5184bad92d03ec844a98267fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
675202e5184bad92d03ec844a98267fc.exe
Resource
win10v2004-20231215-en
General
-
Target
675202e5184bad92d03ec844a98267fc.exe
-
Size
75KB
-
MD5
675202e5184bad92d03ec844a98267fc
-
SHA1
037f7a5b4fae35521f5130470570c2ae51b7bf0c
-
SHA256
2cfb22687096e9857568431ef29bbc14d889e9ed0aea662e2e28fa984d9e0cfa
-
SHA512
ce149fbcf7b1d42aa489b87dda858e52cb4a38be8338aa6f1b98ec9cd03c349213204622112e0f4c4532191a00c570ec29fda88f2fbaf142e47d40deb6a93031
-
SSDEEP
1536:2M669FOOSQ5hgbibVE1qTwswXsLzFali:L7jhgmbVE1qfc+ss
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 675202e5184bad92d03ec844a98267fc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2612 1416 675202e5184bad92d03ec844a98267fc.exe 88 PID 1416 wrote to memory of 2612 1416 675202e5184bad92d03ec844a98267fc.exe 88 PID 1416 wrote to memory of 2612 1416 675202e5184bad92d03ec844a98267fc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\675202e5184bad92d03ec844a98267fc.exe"C:\Users\Admin\AppData\Local\Temp\675202e5184bad92d03ec844a98267fc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Kmp..bat" > nul 2> nul2⤵PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5495a7c8e07c7c00e82acdd4fa9a18664
SHA1143510201204eb172e9d3a72a8f9c2d40d04cefb
SHA25693179b8d8f3895303165ca4d2e9b5482cb42743c4d10743321edf6d4754d72c7
SHA5126600c825bdce57e0badde03376f2ab863a2f34aaf143b5adf9a561e89c57564833944ba9698dc7a196cdc218d44303338e94e26392db8fc565cafbb91b813d9b