Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
7b7970b7daf44aa61fe5c3ea420c276c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b7970b7daf44aa61fe5c3ea420c276c.exe
Resource
win10v2004-20240226-en
General
-
Target
7b7970b7daf44aa61fe5c3ea420c276c.exe
-
Size
35KB
-
MD5
7b7970b7daf44aa61fe5c3ea420c276c
-
SHA1
019b98d1c95c3ce9d3eced4b4115d3a39dfba2c9
-
SHA256
7a11c6cc4b69ebf8ad0a2438bcecf86cea631a0a0abbfeaa8e533c51271d6c02
-
SHA512
eb8f0a22c726786791f8936c883031d6a1fc53c019ee709cf51268817d274e1c251a1b747fb54a95492c61e9d5eea46d10a1886d7bdaab7cc994ccc94dd74a2f
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7cCv:bxNrC7kYo1Fxf3s0cCv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 7b7970b7daf44aa61fe5c3ea420c276c.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2136 5000 7b7970b7daf44aa61fe5c3ea420c276c.exe 90 PID 5000 wrote to memory of 2136 5000 7b7970b7daf44aa61fe5c3ea420c276c.exe 90 PID 5000 wrote to memory of 2136 5000 7b7970b7daf44aa61fe5c3ea420c276c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b7970b7daf44aa61fe5c3ea420c276c.exe"C:\Users\Admin\AppData\Local\Temp\7b7970b7daf44aa61fe5c3ea420c276c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5289df9331a7c9e4d7eb056514f9b6949
SHA1d23fd7bf76dc788769f0a468388417f2870c028e
SHA2562dc7504338741e69a0edcfd01c35076190c34d719ca070032aa36daa193b6540
SHA5122574d0a5b1a2efa76cc8efb57b96b709a66c848c6976f0f28d08a8d7996d84e803bd769beb02cb0209c2a995aead9782ff10cf52d2843c3635a6f978deacefc8