Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
d01cec20a36a14cde4535e016ab1b3c9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d01cec20a36a14cde4535e016ab1b3c9.exe
Resource
win10v2004-20240221-en
General
-
Target
d01cec20a36a14cde4535e016ab1b3c9.exe
-
Size
60KB
-
MD5
d01cec20a36a14cde4535e016ab1b3c9
-
SHA1
eb60aaf1b7acc38efa9c4eda07f9b060e20b7689
-
SHA256
4e2afa87011e8217802f69f4185923222b920c881098e21a8f1c4f3f1822c2cb
-
SHA512
a4f6a7ad7ca99f15bc406f02656162751a4dec251b0dc1184a50284df38b07a50b61364e64b7dc2602cccd17f7e51bc0e8e809ec26046639d97b030659bb0120
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHG:btng54SMLr+/AO/kIhfoKMHdz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation d01cec20a36a14cde4535e016ab1b3c9.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 4052 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 4052 3916 d01cec20a36a14cde4535e016ab1b3c9.exe 80 PID 3916 wrote to memory of 4052 3916 d01cec20a36a14cde4535e016ab1b3c9.exe 80 PID 3916 wrote to memory of 4052 3916 d01cec20a36a14cde4535e016ab1b3c9.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\d01cec20a36a14cde4535e016ab1b3c9.exe"C:\Users\Admin\AppData\Local\Temp\d01cec20a36a14cde4535e016ab1b3c9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5eb8ed21b6982c2b639ec5e8a2c19f381
SHA13afb5c0530fc128d90c99dc1a083132bbe9a24e6
SHA25681960911f5f347e52e11057adf9ac03f1044bccf2532e172c46f7eee929bf5ee
SHA51237e43a82d5255d5c6f2a57cb2c49e4094c45ee8bc8e7235ed05ffb0117270ea9fc1c86fe2f0644773037399060c21ecd2be26a821b4690f3818b6fc748a8649f