Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
341b03a54548687d3dbd54965c8e4e61.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
341b03a54548687d3dbd54965c8e4e61.exe
Resource
win10v2004-20240226-en
General
-
Target
341b03a54548687d3dbd54965c8e4e61.exe
-
Size
69KB
-
MD5
341b03a54548687d3dbd54965c8e4e61
-
SHA1
0d1a9dc63f2a97f9be60fda15d40d0bf39fbecac
-
SHA256
e65ab425d6b5651f7d2f831b35899cbc0bfb738732f08ea2adaf7815f76974c4
-
SHA512
d290eabb59065369a7cbf3ca9dbc2a1d0bdfa90cf0c0e4bdf2d54c96ed0ce9116057eb24b2768f2982a14c70cd1e50daf582a0472c04c2e904e4f01f0d3a63a6
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4wYPsED3VK2+ZtyOjgO4r9vFAg2rqk63Ygx:vj+jsMQMOtEvwDpj5HwYYTjipvF2hS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 341b03a54548687d3dbd54965c8e4e61.exe -
Executes dropped EXE 1 IoCs
pid Process 1900 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1900 5052 341b03a54548687d3dbd54965c8e4e61.exe 88 PID 5052 wrote to memory of 1900 5052 341b03a54548687d3dbd54965c8e4e61.exe 88 PID 5052 wrote to memory of 1900 5052 341b03a54548687d3dbd54965c8e4e61.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\341b03a54548687d3dbd54965c8e4e61.exe"C:\Users\Admin\AppData\Local\Temp\341b03a54548687d3dbd54965c8e4e61.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5b62e9c39b1c60c16224778d95e790557
SHA15af9bce71af5819803322eda76e5b5ffbbf422c6
SHA256c7df8eec94fcf15c3b31a8f5a139ebbe43628f551c9a1c46617b24a94bf2a7b1
SHA512e261c72b45e60c512367d6278fcaf71c2c03ea41ec829dbaf0c74631fc4994461766f2e06b82ac4f55ef319a9c2a6d11514d2edf92b4e411e6aa20b8b1930120