Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
7686c6a43757397856f891dbaaf82218.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7686c6a43757397856f891dbaaf82218.exe
Resource
win10v2004-20231215-en
General
-
Target
7686c6a43757397856f891dbaaf82218.exe
-
Size
72KB
-
MD5
7686c6a43757397856f891dbaaf82218
-
SHA1
9c8c795234c1747e7a9851962e049574a3a83e31
-
SHA256
7ea3a86832b96712068f3b61008239ac46686f15814c74b14e339c58877c922f
-
SHA512
fa7aad42ee8a588bb89024c70ac967dd8dab4e8b5d25f2c625d4874542baaf0b6b75ec02b1f6c845634c1aeeda111c2fd0a87368b7eea160290b6081fef1ae4d
-
SSDEEP
1536:K1UfG4FtE/r/I6uVOrFeGEIIwodsohNt4ZMwyVV:S4/2r/InpfINoz5wu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 7686c6a43757397856f891dbaaf82218.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 676 5024 7686c6a43757397856f891dbaaf82218.exe 89 PID 5024 wrote to memory of 676 5024 7686c6a43757397856f891dbaaf82218.exe 89 PID 5024 wrote to memory of 676 5024 7686c6a43757397856f891dbaaf82218.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7686c6a43757397856f891dbaaf82218.exe"C:\Users\Admin\AppData\Local\Temp\7686c6a43757397856f891dbaaf82218.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ktf..bat" > nul 2> nul2⤵PID:676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5bcc1ee549518ab9bff3cd66f39909955
SHA10da83fc21fa8082286180e9ea66941f18964dbc6
SHA256ea16fa1654bb36eaf0921ce58acfc529343134468f797bef8bfd3c177e8c8db1
SHA512514ebe94436c8e0ce9695b8266abb7fede5081356ed97304cb9dba8eb53a0586597d8456f9e7037db25361653df7ba00ade9f1b8e3fe31912e4cfef17b74badd