Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
fdd37eba78945d743b2d99c05771c878.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdd37eba78945d743b2d99c05771c878.exe
Resource
win10v2004-20240221-en
General
-
Target
fdd37eba78945d743b2d99c05771c878.exe
-
Size
38KB
-
MD5
fdd37eba78945d743b2d99c05771c878
-
SHA1
d3f8aa296086aaaad77e7019fdd99e824cbc31b2
-
SHA256
04725c6c27392120e0f973fed104c049f6a07fa4ec5ca7836d7fc1323af42458
-
SHA512
ffe1fd6493e17f0d36c8cf790705a71b4ce241c0239a8d37d1b6f89e281994bb5c7112fccd8176b565b7d2c7e79b29ee2032a9470ceb21c4848f11498b5cb45f
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLen7n+1:ZzFbxmLPWQMOtEvwDpjLeu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2200714112-3788720386-2559682836-1000\Control Panel\International\Geo\Nation fdd37eba78945d743b2d99c05771c878.exe -
Executes dropped EXE 1 IoCs
pid Process 3992 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3340 wrote to memory of 3992 3340 fdd37eba78945d743b2d99c05771c878.exe 86 PID 3340 wrote to memory of 3992 3340 fdd37eba78945d743b2d99c05771c878.exe 86 PID 3340 wrote to memory of 3992 3340 fdd37eba78945d743b2d99c05771c878.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdd37eba78945d743b2d99c05771c878.exe"C:\Users\Admin\AppData\Local\Temp\fdd37eba78945d743b2d99c05771c878.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD55b36e763f06c2713636aee4cc63e608b
SHA1eff1b653a3f97e4ec7bb3d171e309f121a16e0c3
SHA256659ae731c34984666f8696ab1f425ddae19a7affd6435bfc71e2a0e74a6f45c4
SHA5120b7c05a37603209168f2340f0fec2c8593debd2b7ab59067af2c1bb1d64b33e2d536bf4436713a663172e15bb665759524981806c593289d0cb821a2e9eb295e