Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
84e7cca7d11d4560cc1d6cfdd14e102f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84e7cca7d11d4560cc1d6cfdd14e102f.exe
Resource
win10v2004-20240221-en
General
-
Target
84e7cca7d11d4560cc1d6cfdd14e102f.exe
-
Size
46KB
-
MD5
84e7cca7d11d4560cc1d6cfdd14e102f
-
SHA1
b460e3c8957b21768a17b687d3c1242844ffc77f
-
SHA256
a147a3d4ca92a067ad971f993b8358aefbe1fed1279d4c9a99946a79bee2f695
-
SHA512
c9f7eb3cd1cccf82152376e27d67ce91288bade016f9e1918164f61e5ad97cd98ffa7bd1a431245607f788049a842333d33bf106b9e36098a1f91107039b6dfb
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6IMhyX9:bgGYcA/53GAA6y37Q6z8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\International\Geo\Nation 84e7cca7d11d4560cc1d6cfdd14e102f.exe -
Executes dropped EXE 1 IoCs
pid Process 1680 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1680 1648 84e7cca7d11d4560cc1d6cfdd14e102f.exe 86 PID 1648 wrote to memory of 1680 1648 84e7cca7d11d4560cc1d6cfdd14e102f.exe 86 PID 1648 wrote to memory of 1680 1648 84e7cca7d11d4560cc1d6cfdd14e102f.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e7cca7d11d4560cc1d6cfdd14e102f.exe"C:\Users\Admin\AppData\Local\Temp\84e7cca7d11d4560cc1d6cfdd14e102f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD542429a9e63b880e1f4719f89f38b9a15
SHA1268765b5f6d118b64f5802770c3ce8adf1536172
SHA25607fa2a0af41759792c5c31db4bc956434ed365cb517f21258279c014821c4135
SHA512aabf1a84bcededc16bbbe5e786cf5768e6b8b14e5df298f914d4928b9796f3783158b964c01d2a6bffa65cdbb0056f3647fb79604e1563d23cc619e65a65fb1a