Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
966af0bdac4c96374dd7d9dc538c70ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
966af0bdac4c96374dd7d9dc538c70ed.exe
Resource
win10v2004-20231215-en
General
-
Target
966af0bdac4c96374dd7d9dc538c70ed.exe
-
Size
58KB
-
MD5
966af0bdac4c96374dd7d9dc538c70ed
-
SHA1
23d8c437d0a35d141f918ee08c9d415d92339efe
-
SHA256
e646ab2c9d299d742908458b35c8e9b27019443f39780e47a7e7feb5362aaeff
-
SHA512
5e61eb34680adfc4bd19bbdd389ad987d3d3f5aa58ad05dcc96eaea34be4315e84bd491d2a7a2e305d8709a321f0f1a0322c605eda2cbae9dd113d8e4bd6bcc2
-
SSDEEP
768:J5g1e3lRaujSrR2c3jjAuiD6GFLth9SSpYlfRv1iA+wPZIxkZppR4RL9W1H593S+:JorR2yyFzSgY/vxIx+Zg9WpfCoH/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 966af0bdac4c96374dd7d9dc538c70ed.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 Uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3804 wrote to memory of 1644 3804 966af0bdac4c96374dd7d9dc538c70ed.exe 85 PID 3804 wrote to memory of 1644 3804 966af0bdac4c96374dd7d9dc538c70ed.exe 85 PID 3804 wrote to memory of 1644 3804 966af0bdac4c96374dd7d9dc538c70ed.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\966af0bdac4c96374dd7d9dc538c70ed.exe"C:\Users\Admin\AppData\Local\Temp\966af0bdac4c96374dd7d9dc538c70ed.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe" end2⤵
- Executes dropped EXE
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5966af0bdac4c96374dd7d9dc538c70ed
SHA123d8c437d0a35d141f918ee08c9d415d92339efe
SHA256e646ab2c9d299d742908458b35c8e9b27019443f39780e47a7e7feb5362aaeff
SHA5125e61eb34680adfc4bd19bbdd389ad987d3d3f5aa58ad05dcc96eaea34be4315e84bd491d2a7a2e305d8709a321f0f1a0322c605eda2cbae9dd113d8e4bd6bcc2