Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
ba3b256b90adbec6ec977ce70bf3e400.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ba3b256b90adbec6ec977ce70bf3e400.exe
Resource
win10v2004-20231215-en
General
-
Target
ba3b256b90adbec6ec977ce70bf3e400.exe
-
Size
59KB
-
MD5
ba3b256b90adbec6ec977ce70bf3e400
-
SHA1
9c7b25cf0d8b502fc322bcdcc5151a4826530948
-
SHA256
bc01ac271a0ec0a3a7342721ed084b508b1267b2a8d8a8227cdb2e8f84410ad7
-
SHA512
c061228898a6d379aa76147627d1a8ee4f4b630c20d948594e667b58617757c72dc60b51b5fd8533c742c844c13b306e9fa58f676557bdeffa38728dd55f1bce
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHNWo:btng54SMLr+/AO/kIhfoKMHd6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation ba3b256b90adbec6ec977ce70bf3e400.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 680 wrote to memory of 2052 680 ba3b256b90adbec6ec977ce70bf3e400.exe 88 PID 680 wrote to memory of 2052 680 ba3b256b90adbec6ec977ce70bf3e400.exe 88 PID 680 wrote to memory of 2052 680 ba3b256b90adbec6ec977ce70bf3e400.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3b256b90adbec6ec977ce70bf3e400.exe"C:\Users\Admin\AppData\Local\Temp\ba3b256b90adbec6ec977ce70bf3e400.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD51fa9abd801464ed096c824afe9dcb163
SHA1c15be4cea891c8bca09af46a77e0cc93c8b62f04
SHA256637994cef21a32ec72f76cb813a834f2652d500d815ddbc1a404da5d404b1f16
SHA512f1f383ab2c2d7a1db9cece8768ff08ac70a0da6198729b06723633a7c8010323577487a4c8efc20cf5acc32f890c698272ace6b4a38551178e3341e9f1f076ff