Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
c0cfd962cfce308d7b9b0af7a315e252.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c0cfd962cfce308d7b9b0af7a315e252.exe
Resource
win10v2004-20231222-en
General
-
Target
c0cfd962cfce308d7b9b0af7a315e252.exe
-
Size
33KB
-
MD5
c0cfd962cfce308d7b9b0af7a315e252
-
SHA1
999362920846374546b3e4658a344650cdb11215
-
SHA256
c13672f7f20dfa6a5a467710b83a0c742728c5f73204474e7997061be8c4847f
-
SHA512
36168a26ab61fdfc6cfbae91c6dea8c4df0a392e930a3bcd0308ed4a164fb25d1ee24c974cb9a69d2407e7b97f298f5b1312761a1851805bec90e1199624a488
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6c3l8Sz960E:bAvJCYOOvbRPDEgXRc3SSz3E
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation demka.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation c0cfd962cfce308d7b9b0af7a315e252.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1948 4172 c0cfd962cfce308d7b9b0af7a315e252.exe 83 PID 4172 wrote to memory of 1948 4172 c0cfd962cfce308d7b9b0af7a315e252.exe 83 PID 4172 wrote to memory of 1948 4172 c0cfd962cfce308d7b9b0af7a315e252.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0cfd962cfce308d7b9b0af7a315e252.exe"C:\Users\Admin\AppData\Local\Temp\c0cfd962cfce308d7b9b0af7a315e252.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5732e29573ca272f4728773e5d0989c38
SHA1dbe420aaf72fa8e4cfb6041360574cb7c7a0f25b
SHA2565753a9608df2400fe8aa714c0f4a7d0b283ae51caba8107c298dfb7ada799fe0
SHA5120fcf370370a218ec299b8636b213127aea4720c53947c3f565296756bfd793a772de2fe66a9e6c5d7f2bd547357531d89fca775c1a5e07ad87fb61f05e1a2e87