Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
96bff2573c5778118eb13dde0e187b20.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96bff2573c5778118eb13dde0e187b20.exe
Resource
win10v2004-20240226-en
General
-
Target
96bff2573c5778118eb13dde0e187b20.exe
-
Size
60KB
-
MD5
96bff2573c5778118eb13dde0e187b20
-
SHA1
9360acdfc6ab6420682f39c64b2f96e59fe0df57
-
SHA256
55f8e1f14e74637969080aeff441fc320ffbb29411351331fb76fc009ffc7ce3
-
SHA512
0db591ce84c8a38d6ce178d527863e1237744354444e468d9c867f2e17c0863ee8af18c63cbbb26e3878702d1140bfe017364a5c0803be429b5f76ef91523b13
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj38lD/cMAT+lBOM:ZVxkGOtEvwDpj4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 96bff2573c5778118eb13dde0e187b20.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 3672 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3672 3232 96bff2573c5778118eb13dde0e187b20.exe 99 PID 3232 wrote to memory of 3672 3232 96bff2573c5778118eb13dde0e187b20.exe 99 PID 3232 wrote to memory of 3672 3232 96bff2573c5778118eb13dde0e187b20.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\96bff2573c5778118eb13dde0e187b20.exe"C:\Users\Admin\AppData\Local\Temp\96bff2573c5778118eb13dde0e187b20.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:2308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD55adb609d22b3c992a032bb85ef4b526b
SHA119b5f5e83a4492490b73a70316eae787b24ba4f4
SHA256c9048ffe7ff35cde9940e7ba85661dbc1dc2e1bedabbacfe7c63c3fface887ec
SHA5124c70e70781cbe124d86ceb2724304e12a9a406e89c14495620218567f7a3f2abaa9f48051fc56858691846bec9f91b746bc08657f71949761445e42b39fa0e4e