Analysis
-
max time kernel
155s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 14:21
Static task
static1
Behavioral task
behavioral1
Sample
727750484416bf033b50d84ea682716d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
727750484416bf033b50d84ea682716d.exe
Resource
win10v2004-20231215-en
General
-
Target
727750484416bf033b50d84ea682716d.exe
-
Size
47KB
-
MD5
727750484416bf033b50d84ea682716d
-
SHA1
447cd063d225078fc09f2eaa0ed701f68c15efbf
-
SHA256
180009a6f0786e381751d83c292bf4c3119d14eda0bbf7cec67137e4028d5c59
-
SHA512
258a18d4c0ec9bf7d2ec2c77d62e6c8cd4f9adf11760d4ca2ac7d83dfecbea8b02a46dc6e2631e6d164f15b78f36d82d3483b5607ffa8fd267a2d15618516098
-
SSDEEP
768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxx:24Bobv7aB0EooYEC3rUVcYx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 727750484416bf033b50d84ea682716d.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 2212 4280 727750484416bf033b50d84ea682716d.exe 89 PID 4280 wrote to memory of 2212 4280 727750484416bf033b50d84ea682716d.exe 89 PID 4280 wrote to memory of 2212 4280 727750484416bf033b50d84ea682716d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\727750484416bf033b50d84ea682716d.exe"C:\Users\Admin\AppData\Local\Temp\727750484416bf033b50d84ea682716d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD52a3b61aec77c7208900d58b2969cd406
SHA18d8c9126d5d1146e9596d1c2ca37a6b7cf8e0523
SHA256e3fc0483a17e84cee1183cb561319ba41b7272836e1791efaec10bc8b1e831b9
SHA51238d6059d0ea667ecbeca04726300a06acaf670071258396728618cdced38424861043fc8ad0328eaa870c8dabd26c9e657895b3b68f8b8c2daf5d815e4c18730