Analysis
-
max time kernel
93s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
ab7f4e97db788ebd3ce17edc09eeed05.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab7f4e97db788ebd3ce17edc09eeed05.exe
Resource
win10v2004-20240226-en
General
-
Target
ab7f4e97db788ebd3ce17edc09eeed05.exe
-
Size
118KB
-
MD5
ab7f4e97db788ebd3ce17edc09eeed05
-
SHA1
5ab6a65587261aa116e065d5e6b27adf7edd2fb9
-
SHA256
83780cbcc9389f947a085bb5386bb15e6e8b8aa119c523187d655c3dace5d549
-
SHA512
4ea211d0c84ec1e67a47e19778536d91005a6582637310b2d752aced2721f0d6d3006b6b4b78a49220776c93b0d7e9e0394768f47fd4292116f50a86235442be
-
SSDEEP
3072:eijJkRqDIaSGqkx9V5pmRzb2REyXr8K5DMfz:XJiqvSGqkuzqLXQQ8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation ab7f4e97db788ebd3ce17edc09eeed05.exe -
Executes dropped EXE 1 IoCs
pid Process 32 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe ab7f4e97db788ebd3ce17edc09eeed05.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 ab7f4e97db788ebd3ce17edc09eeed05.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 32 2216 ab7f4e97db788ebd3ce17edc09eeed05.exe 91 PID 2216 wrote to memory of 32 2216 ab7f4e97db788ebd3ce17edc09eeed05.exe 91 PID 2216 wrote to memory of 32 2216 ab7f4e97db788ebd3ce17edc09eeed05.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7f4e97db788ebd3ce17edc09eeed05.exe"C:\Users\Admin\AppData\Local\Temp\ab7f4e97db788ebd3ce17edc09eeed05.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
PID:32
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5f2f878b0837531a2cdbe7d90918e061d
SHA19759b315bb42bfd565a1cea7c242acb9417da36e
SHA2565d8cf48384a14ed8b7b0faee713ec82861aef56cb17e1a1dfa2256d252668b62
SHA5120a1edce74d6307a18f544b033644f1044042afd61f7f3847e162e673723120a6a137ab0a0c9d498d3957d7c39dbf02e032f19569bbd897a906b3e13b06013d66