Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
95a0d45a782cead55491ebfc69e6e976.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95a0d45a782cead55491ebfc69e6e976.exe
Resource
win10v2004-20240221-en
General
-
Target
95a0d45a782cead55491ebfc69e6e976.exe
-
Size
51KB
-
MD5
95a0d45a782cead55491ebfc69e6e976
-
SHA1
be2c744174bf720d9c8fe6a4914c2524b1206b35
-
SHA256
4ca4414140c38760fd6d4b09f75b7eab690bf0dfaa012c9d965ed6400dbe4fcc
-
SHA512
2151e01ef9bd506c2207ac63c14de7a05581ccf7303595140487324dff44d43adca1e9045416e259a0158bf56ee27ef98d28a22d6e1d4d68d3f51b0bd6e2d71a
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MzF3Fn:i5nkFGMOtEvwDpjNbwQEqN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation 95a0d45a782cead55491ebfc69e6e976.exe -
Executes dropped EXE 1 IoCs
pid Process 2848 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2848 4424 95a0d45a782cead55491ebfc69e6e976.exe 88 PID 4424 wrote to memory of 2848 4424 95a0d45a782cead55491ebfc69e6e976.exe 88 PID 4424 wrote to memory of 2848 4424 95a0d45a782cead55491ebfc69e6e976.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a0d45a782cead55491ebfc69e6e976.exe"C:\Users\Admin\AppData\Local\Temp\95a0d45a782cead55491ebfc69e6e976.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD596c9bce015f8b8473b9d0e4bdc7949af
SHA10e982213a4e743062ced4afc9f09c2900fde0ed9
SHA256a8b5326d27416f5012503012f9f4c71ee222f2597e48218c7f846024d7db907e
SHA512bf3737f1a0e063dd3e8441481e209e88b524ded6c1ad46e8f19a70d50c8d16fa089bf0e11b8c0ed09dd69ac46fe2dd313d016da3df3d7ea016c4f248264a7d32