Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
a3a1eb9266fe726d012f151f8f215beb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3a1eb9266fe726d012f151f8f215beb.exe
Resource
win10v2004-20240221-en
General
-
Target
a3a1eb9266fe726d012f151f8f215beb.exe
-
Size
2.5MB
-
MD5
a3a1eb9266fe726d012f151f8f215beb
-
SHA1
d21b86ffb7ccd3badb9430aff77708e81899f180
-
SHA256
ef1cadcbc61bbce6e0a7b839e0e4935307f4b7a67088ae300720b3a27b2b95c4
-
SHA512
691b57f1609857adc124dd7ec2d7158249274607d806522b0091282c4eef71d65b964abe27176b101e68c41734671f63ea70dcdacc3187b115c27bff107feee6
-
SSDEEP
49152:BTTULEnhXcKk9vENby4xXjySlDkqcoi3kHCicjhUMsxTWN0Imie:uLEnhXc9ibygXj9Yhj3kiiybsxTm0ImX
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1790404759-2178872477-2616469472-1000\Control Panel\International\Geo\Nation a3a1eb9266fe726d012f151f8f215beb.exe -
Executes dropped EXE 1 IoCs
pid Process 4668 Install Lucky Coupon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2164 wrote to memory of 4668 2164 a3a1eb9266fe726d012f151f8f215beb.exe 89 PID 2164 wrote to memory of 4668 2164 a3a1eb9266fe726d012f151f8f215beb.exe 89 PID 2164 wrote to memory of 4668 2164 a3a1eb9266fe726d012f151f8f215beb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3a1eb9266fe726d012f151f8f215beb.exe"C:\Users\Admin\AppData\Local\Temp\a3a1eb9266fe726d012f151f8f215beb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\AIR566D.tmp\Install Lucky Coupon.exe"C:\Users\Admin\AppData\Local\Temp\AIR566D.tmp\Install Lucky Coupon.exe"2⤵
- Executes dropped EXE
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5a8de8f53f70337245e61bf0ff5faa216
SHA1805258de64a9a659ba522b4ff62cd389cb6ca5e3
SHA25651c74b38779c03f1f5c429159553263bfdaeb65b93730ec15c0556507ce9bec8
SHA5125e3d197177aa3be39972a56f15d2111ddcbc1735ecf0e9e321a36be99d1c58691438d1a9ff7bf6fe3855ea07acc76271b26482e54204069762b6fd486c902dd7
-
Filesize
130KB
MD5a7ffdf55079873b0f041da8a56e83f29
SHA105f2ac17287372c0d953794df2e5b62f1ed8e717
SHA2567e22c807669c4eedc83d2a273fc15d947d376e029c79973b8cba2b6ca49dde75
SHA5122cb01b55799a603f35c694e328b0e653b8dbe1d7cfa4f52e6668093123f978b95accbaa446baeb104ed9a8b0418882119b199474faf1815faa64d7e7a269b372