Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
85a6fa519c6246df21f871416b5081eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85a6fa519c6246df21f871416b5081eb.exe
Resource
win10v2004-20231222-en
General
-
Target
85a6fa519c6246df21f871416b5081eb.exe
-
Size
147KB
-
MD5
85a6fa519c6246df21f871416b5081eb
-
SHA1
2ec7401aa0ab916ae793195e2d8a742f40a4b7df
-
SHA256
953a4faee2dd24df96ad4b6f678b7127d09ee3a0381eff838d86129c8227d9e9
-
SHA512
4c684d85ea241ce7e37e47573cb2b76af250d68a068f0473b8143a912ea6a13f763a6702eebe254b18b558431df79d1c845786e698bcfe6d0dc1582a86eb941d
-
SSDEEP
3072:wggXnmCQXqSQHW2YEDzNturn7WfsWChakHdY3b9BYvukO2:wggXnm16pWMturifsW6W7sukO2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 85a6fa519c6246df21f871416b5081eb.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe 85a6fa519c6246df21f871416b5081eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1180 85a6fa519c6246df21f871416b5081eb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1856 1180 85a6fa519c6246df21f871416b5081eb.exe 84 PID 1180 wrote to memory of 1856 1180 85a6fa519c6246df21f871416b5081eb.exe 84 PID 1180 wrote to memory of 1856 1180 85a6fa519c6246df21f871416b5081eb.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\85a6fa519c6246df21f871416b5081eb.exe"C:\Users\Admin\AppData\Local\Temp\85a6fa519c6246df21f871416b5081eb.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5ecd5db09b41418ede7228193d5d64d6a
SHA12ac7812be6d59e742e0bc4206b8b7ae0f7c7f878
SHA256ba6281f915d44202fb4b945b991ba4af1e18d6cc03d4b564d58cbb04deca98b5
SHA5124930b4315233a76edf4a842f833b006d9e067c587c4015faf36a2bdfd805762d16f9995fc6d2781fd2a1a2d4fbed4691ea053205b4a0ef41e3049268b6734d9d