Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
74e6908518cfedd86721fd05a6addaf3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74e6908518cfedd86721fd05a6addaf3.exe
Resource
win10v2004-20231215-en
General
-
Target
74e6908518cfedd86721fd05a6addaf3.exe
-
Size
10KB
-
MD5
74e6908518cfedd86721fd05a6addaf3
-
SHA1
278ea4589bf7669e01006a551a47c9456127f5be
-
SHA256
ef413af021f027b66075cec8b0a75b045b8e909f7728c90fd87076ee4310ff01
-
SHA512
420ddf82810dbb068a41047f8de6187f4bb4116056fa320a1d01dab927509c022bc15319fdc5537b379e813e563348aacaa7233f37e3d809230d51bac28a0084
-
SSDEEP
96:zb+u4l46fPl6C8w/Z3cy4cfnp35veaiUg55i7YSJPoJbNJFdsWedvEmMYYpG:WHO6V6CXZSYp0aiZni7PJPydYvVN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 74e6908518cfedd86721fd05a6addaf3.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation ffengh.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 ffengh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3404 wrote to memory of 2800 3404 74e6908518cfedd86721fd05a6addaf3.exe 88 PID 3404 wrote to memory of 2800 3404 74e6908518cfedd86721fd05a6addaf3.exe 88 PID 3404 wrote to memory of 2800 3404 74e6908518cfedd86721fd05a6addaf3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e6908518cfedd86721fd05a6addaf3.exe"C:\Users\Admin\AppData\Local\Temp\74e6908518cfedd86721fd05a6addaf3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\ffengh.exe"C:\Users\Admin\AppData\Local\Temp\ffengh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5805740f109998b59d561db2c147cb362
SHA1f4482b54a452df225461f5e2226ffc78e8f4c773
SHA256251b51fa159f551af73790c8df0311aeca1317e0bb8649018b2f5ce320499c69
SHA512c81850ccf249744190bb58211d26042588ee2212336884937d7eaa3ae43ea65cfad281bf748c0cf9ada6835004b2543fecc793ec194bc2e1ee9c9a97ea3b7e17