Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
cd2f2f0a59f5ee39bb1dd52f854f97bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd2f2f0a59f5ee39bb1dd52f854f97bd.exe
Resource
win10v2004-20240221-en
General
-
Target
cd2f2f0a59f5ee39bb1dd52f854f97bd.exe
-
Size
31KB
-
MD5
cd2f2f0a59f5ee39bb1dd52f854f97bd
-
SHA1
948b04c91660ee2475599dd1d3fd27a5896df4a2
-
SHA256
822a0c35e3177e8e5aebae815d462876f890a03c6e48d03bd5bfabe437ccac27
-
SHA512
0ba7436ceacf44e37824aa67f26070e37395568e1ea3973df484e2553e849cb2c87abda5eb76d960cd05fa0159a42ef4315bcc3be135212696214438c4520c5a
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunvsjU:bA74zYcgT/Ekd0ryfjPIunvsjU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation cd2f2f0a59f5ee39bb1dd52f854f97bd.exe -
Executes dropped EXE 1 IoCs
pid Process 3204 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3204 2300 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe 89 PID 2300 wrote to memory of 3204 2300 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe 89 PID 2300 wrote to memory of 3204 2300 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd2f2f0a59f5ee39bb1dd52f854f97bd.exe"C:\Users\Admin\AppData\Local\Temp\cd2f2f0a59f5ee39bb1dd52f854f97bd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5e43f0686fec8ec2dc2dcd602c8332fa3
SHA196f17d917d51d7bd98c4f5f55617df8e88a56cf3
SHA256a0addb0dd1a06ca87c4714ded77f8f0c5dfec8065d4a6e01a70a137ada78cb9b
SHA5120e834c9bf119d985191974c7b489dcb018f17453c6a37af92ceef7dbcee2df86e62aa1e1d92f51bfef65a716a1b39d27a17b862dbedfff4ff1f1967b9bce8c29