Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
63a855c21325fdba540c13b5710f55ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63a855c21325fdba540c13b5710f55ff.exe
Resource
win10v2004-20240220-en
General
-
Target
63a855c21325fdba540c13b5710f55ff.exe
-
Size
45KB
-
MD5
63a855c21325fdba540c13b5710f55ff
-
SHA1
3b15ab88bf531b5c62a9eb948342feb375433dec
-
SHA256
eecd4103b77a579002516585a296a32af54b4e74c8903ce36f070f524d957d91
-
SHA512
d18cbc4c1e69dd52e81c17a1d5dd4b46e9c5e429cea6f4f7637a42354b3fee7878a514792c76ebd8ccd605a6d558c805d1e98b8f3266d9b2381019118c457250
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/WZrEu/d+qmsUHQ1wsH:ZzFbxmLPWQMOtEvwDpj386Sj/WprqQ1J
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2097088205-1470669305-146258644-1000\Control Panel\International\Geo\Nation 63a855c21325fdba540c13b5710f55ff.exe -
Executes dropped EXE 1 IoCs
pid Process 4724 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4724 5092 63a855c21325fdba540c13b5710f55ff.exe 86 PID 5092 wrote to memory of 4724 5092 63a855c21325fdba540c13b5710f55ff.exe 86 PID 5092 wrote to memory of 4724 5092 63a855c21325fdba540c13b5710f55ff.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\63a855c21325fdba540c13b5710f55ff.exe"C:\Users\Admin\AppData\Local\Temp\63a855c21325fdba540c13b5710f55ff.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5cf8f7c589f540add7ad70039c82c8334
SHA118e9be8588d8f3d574b3cfc5974075af990a53af
SHA256f62582b74b04014178e5b5abc32eeb25a6e9d25239705b01880fa36c1ae6641b
SHA5126e2aad6c5ffa770369c73c018fca9e27ea986865944d35ac849c6ea72359b04954cb9fc308cc88aabfc39e8f064cb1caca54e103a6afc8c383b66a7474b2f4c8