Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 03:42
Behavioral task
behavioral1
Sample
a22d414045a31a20c9878baf2799f560.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a22d414045a31a20c9878baf2799f560.exe
Resource
win10v2004-20231215-en
General
-
Target
a22d414045a31a20c9878baf2799f560.exe
-
Size
77KB
-
MD5
a22d414045a31a20c9878baf2799f560
-
SHA1
0059edf1121b22da87bf39899d3e69b715d32cc4
-
SHA256
0499e1c7544298c0c1f4a8fb1130f8bb85a6c1b2e7a0c318d771116d247663ca
-
SHA512
089e958eecf899e756da0891c1919182156bb95f3baf165a6870ea72ee7b9507231df613ef5b86bba26a8c2b888f6e6be4880efd9f347a1f99e25769abf06736
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyB1:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation a22d414045a31a20c9878baf2799f560.exe -
Executes dropped EXE 1 IoCs
pid Process 876 misid.exe -
resource yara_rule behavioral2/memory/3000-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0007000000023238-13.dat upx behavioral2/memory/3000-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/876-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/876-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3000 wrote to memory of 876 3000 a22d414045a31a20c9878baf2799f560.exe 84 PID 3000 wrote to memory of 876 3000 a22d414045a31a20c9878baf2799f560.exe 84 PID 3000 wrote to memory of 876 3000 a22d414045a31a20c9878baf2799f560.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22d414045a31a20c9878baf2799f560.exe"C:\Users\Admin\AppData\Local\Temp\a22d414045a31a20c9878baf2799f560.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD504ee836afb3267d53c36e48002503888
SHA1069a4015482b41cf31d3907d7226d0d7e84cf001
SHA25687c9ce232852f24a8ddaf231abaaa059a3f56a83127a088ac72c1733cfedbf61
SHA5123f2a020ff71d4516cfaa071956e19304f972395fd720ba8268b326adeabd902323a219e5eb577a8fdccf8f5526cd723afdc26b06f8264382bde72b68e879603b