Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
7234ca5ac4feab4274c7bb73d3c3dcb5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7234ca5ac4feab4274c7bb73d3c3dcb5.exe
Resource
win10v2004-20231215-en
General
-
Target
7234ca5ac4feab4274c7bb73d3c3dcb5.exe
-
Size
92KB
-
MD5
7234ca5ac4feab4274c7bb73d3c3dcb5
-
SHA1
28d9960229ebe102ae2e79a289351e05d0e51d66
-
SHA256
07aaacde8192179332b63648ce6c784fbaeffbdedd27408ea3ef64b26aa487b7
-
SHA512
1801034cb82b69670726b102d244ba3e87efc27a26d28fd081241effe543a4ed7a806fe88bbe6c6d4d3b77e105d4bce8b91905ffbc22d01af9f293c8a9147696
-
SSDEEP
1536:Xn/oYXOzlyL+BXLJlZ/EReRAMZN4W2pJBGLgNQ:X/odlyYXtUYRxN4W2pJxe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 7234ca5ac4feab4274c7bb73d3c3dcb5.exe -
Executes dropped EXE 1 IoCs
pid Process 596 ÌÚѶ°²È«³ÌÐò.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\Tasks\ÌÚѶ°²È«³ÌÐò.exe 7234ca5ac4feab4274c7bb73d3c3dcb5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 7234ca5ac4feab4274c7bb73d3c3dcb5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2568 wrote to memory of 596 2568 7234ca5ac4feab4274c7bb73d3c3dcb5.exe 87 PID 2568 wrote to memory of 596 2568 7234ca5ac4feab4274c7bb73d3c3dcb5.exe 87 PID 2568 wrote to memory of 596 2568 7234ca5ac4feab4274c7bb73d3c3dcb5.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7234ca5ac4feab4274c7bb73d3c3dcb5.exe"C:\Users\Admin\AppData\Local\Temp\7234ca5ac4feab4274c7bb73d3c3dcb5.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\WINDOWS\Tasks\ÌÚѶ°²È«³ÌÐò.exe"C:\WINDOWS\Tasks\ÌÚѶ°²È«³ÌÐò.exe"2⤵
- Executes dropped EXE
PID:596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD55fa59562d322b68f0c40e5d817ba5599
SHA1727335f39cbeebd73f736f8e14d2af367f70d116
SHA2569337ae7f8dc4cb6d4222dde428fd52ed7b5278ab01e909451fbb3f1e9c49aced
SHA51204676f47f8f575171074461a5a9458fd2888129bd87f2892b4ec054b15785a8cd8e278ac3fa1e6c8dca69f51ddcca569a03d1432d2d7676e2e83273ed6b6bd86