Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 00:28
Behavioral task
behavioral1
Sample
95c54c27feb6ffdb79c8f85e0d222e7c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95c54c27feb6ffdb79c8f85e0d222e7c.exe
Resource
win10v2004-20231215-en
General
-
Target
95c54c27feb6ffdb79c8f85e0d222e7c.exe
-
Size
29KB
-
MD5
95c54c27feb6ffdb79c8f85e0d222e7c
-
SHA1
fa0cb61c1354c2074e29bc93b79c5b99d8c0a148
-
SHA256
82f66e41ba1f129b78687162e07550f44d0a0cea47ea71ddf8eba485efacfb67
-
SHA512
19ffdc571c23a99b04c2dff7dfa07c1c6e2a2de1faf687a2a225f6b57b495fd87b863bac771b51436f9c2ef3156362489c3c4289f6e23d17f954048de6b0e3e1
-
SSDEEP
768:L5gRLUme+TH+enTC6/Ur4xYapnc7cXYHqe:0UmeYHRTkkuWn9YKe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 95c54c27feb6ffdb79c8f85e0d222e7c.exe -
resource yara_rule behavioral2/memory/4776-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4776-3-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1792 4776 95c54c27feb6ffdb79c8f85e0d222e7c.exe 85 PID 4776 wrote to memory of 1792 4776 95c54c27feb6ffdb79c8f85e0d222e7c.exe 85 PID 4776 wrote to memory of 1792 4776 95c54c27feb6ffdb79c8f85e0d222e7c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c54c27feb6ffdb79c8f85e0d222e7c.exe"C:\Users\Admin\AppData\Local\Temp\95c54c27feb6ffdb79c8f85e0d222e7c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵PID:1792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD59b6723d60dbe3fada94d8600bc3e91be
SHA11d1e6d1e4e4b226243b62c7731cbc04f5adc7692
SHA256d3d604365d4172f69b90e93e607896ca86bcd4fee7e2a35e6b7ec96c939b12be
SHA512b8f20998773740045074f8e6caaff996c5ee303b8b39492bc0d07d068b1fd4e72bd7f907dc6e74d65b72a1269d1b55bfe984980ad0ffc63342e2b953eaa40024