Analysis
-
max time kernel
172s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
7d806a8dc2cba7a19367f2df6469c637.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d806a8dc2cba7a19367f2df6469c637.exe
Resource
win10v2004-20231215-en
General
-
Target
7d806a8dc2cba7a19367f2df6469c637.exe
-
Size
2.1MB
-
MD5
7d806a8dc2cba7a19367f2df6469c637
-
SHA1
e20e0bc603b5bb35a858e4d146e2a1a163971530
-
SHA256
c3814d14e580005378655d2ab8a2e889a0bf517b80b13e394b88d8f7e7b0d29b
-
SHA512
e8d4b5b483793ad2f655ec5e2d40388c0308d86e01995042bb5c94ad58b93a974ec041011093404faa09bc5f0982bea608f62dcd03e2e6d78cb1a5b3d7f6bf88
-
SSDEEP
49152:2uzbL+u+4fWHLY0j1IK9Fj7w1cGxRshM5q:2uvL+B8WHLXjCK9Fnccwsh9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 7d806a8dc2cba7a19367f2df6469c637.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2632 wrote to memory of 4944 2632 7d806a8dc2cba7a19367f2df6469c637.exe 92 PID 2632 wrote to memory of 4944 2632 7d806a8dc2cba7a19367f2df6469c637.exe 92 PID 2632 wrote to memory of 4944 2632 7d806a8dc2cba7a19367f2df6469c637.exe 92 PID 2632 wrote to memory of 4828 2632 7d806a8dc2cba7a19367f2df6469c637.exe 94 PID 2632 wrote to memory of 4828 2632 7d806a8dc2cba7a19367f2df6469c637.exe 94 PID 2632 wrote to memory of 4828 2632 7d806a8dc2cba7a19367f2df6469c637.exe 94 PID 2632 wrote to memory of 3916 2632 7d806a8dc2cba7a19367f2df6469c637.exe 96 PID 2632 wrote to memory of 3916 2632 7d806a8dc2cba7a19367f2df6469c637.exe 96 PID 2632 wrote to memory of 3916 2632 7d806a8dc2cba7a19367f2df6469c637.exe 96 PID 2632 wrote to memory of 5008 2632 7d806a8dc2cba7a19367f2df6469c637.exe 98 PID 2632 wrote to memory of 5008 2632 7d806a8dc2cba7a19367f2df6469c637.exe 98 PID 2632 wrote to memory of 5008 2632 7d806a8dc2cba7a19367f2df6469c637.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d806a8dc2cba7a19367f2df6469c637.exe"C:\Users\Admin\AppData\Local\Temp\7d806a8dc2cba7a19367f2df6469c637.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:4944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:4828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:3916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:5008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:3352
-