Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
3b739e7afb234506b2f86fc043c6e82f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3b739e7afb234506b2f86fc043c6e82f.exe
Resource
win10v2004-20240226-en
General
-
Target
3b739e7afb234506b2f86fc043c6e82f.exe
-
Size
85KB
-
MD5
3b739e7afb234506b2f86fc043c6e82f
-
SHA1
6e530248ba43e1c1a94c970af5d248d0cceb0aa2
-
SHA256
72710f5ff9e7736349c1fcd447f19dd0e6f191fd98a2d24d250bb9fc0213f4fe
-
SHA512
dce11476786127a2d4ea57b11454186613b31d4ca1878e7553fa89cb36d7a363fd2ad5f24151ed6f74096ceb23469bbd844663bd845d6c6d38415fd0031b36cc
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvP2Ih:i5nkFGMOtEvwDpjNbwQEI8UtzNcO8n
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 3b739e7afb234506b2f86fc043c6e82f.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 4800 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4800 3992 3b739e7afb234506b2f86fc043c6e82f.exe 90 PID 3992 wrote to memory of 4800 3992 3b739e7afb234506b2f86fc043c6e82f.exe 90 PID 3992 wrote to memory of 4800 3992 3b739e7afb234506b2f86fc043c6e82f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b739e7afb234506b2f86fc043c6e82f.exe"C:\Users\Admin\AppData\Local\Temp\3b739e7afb234506b2f86fc043c6e82f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD57fa90601974736f49226125ac55d243f
SHA1efeaaeae161a39d67fa4b701a22036caf4179c43
SHA25695387a88d4f8f54cbc0c531501f5e3b746fba8d8563e1cd5d38a1103d5ee0626
SHA512a46bfb8971ea9f70b3a6d95557dfecd479ec318ea6595a2fcfc6b6bbc8b5062804f1863940c0d5bf15b6e33b965170f42425ead587e2fdefb7378bb1294d134b