Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
1df63f6522f3f9dd7db737a0b71be436.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1df63f6522f3f9dd7db737a0b71be436.exe
Resource
win10v2004-20231215-en
General
-
Target
1df63f6522f3f9dd7db737a0b71be436.exe
-
Size
34KB
-
MD5
1df63f6522f3f9dd7db737a0b71be436
-
SHA1
36839e97bf43240b064444d07c0badf57b52949c
-
SHA256
81bb92876afdbb551292028fb7ee5560280d57a1e6e436d1688de3c1d0e6790a
-
SHA512
0974be7377adbca3f777199f0c910228879bd1a43d85793490a9c8ba81a28619249b073b97ae27446dc059ca478351d471292d958dc329cb3ade7617de6635f3
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EI4:b/yC4GyNM01GuQMNXw2PSjH+Pk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1df63f6522f3f9dd7db737a0b71be436.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4024 4432 1df63f6522f3f9dd7db737a0b71be436.exe 83 PID 4432 wrote to memory of 4024 4432 1df63f6522f3f9dd7db737a0b71be436.exe 83 PID 4432 wrote to memory of 4024 4432 1df63f6522f3f9dd7db737a0b71be436.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df63f6522f3f9dd7db737a0b71be436.exe"C:\Users\Admin\AppData\Local\Temp\1df63f6522f3f9dd7db737a0b71be436.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:4024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD587fc6e852d9f0ec31bddcd7099d017cf
SHA1a6c6ef3b3f1113e75df758b3c67db41cd1e97ea0
SHA2562bfd93189979f2124ab37c614570d1e77e9a3adb6aaac7e9b470b12b9aff451b
SHA512d52b3481e26b8ec108aba9550fd604cbf38588618a602fa61079af3ee38de32c54bff149ed9b76982d580eef5706c799a8fbaf90cd2d87c7c654a28879da8211