Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 22:10
Behavioral task
behavioral1
Sample
7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe
Resource
win10v2004-20240226-en
General
-
Target
7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe
-
Size
144KB
-
MD5
33b30e12564983fdba9ef8842ed64f98
-
SHA1
f358223c7ee599bb8243e3382c300b649ad63da2
-
SHA256
7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a
-
SHA512
6bfaa8c3d8280b979403cb8f15dcc8274564df9239fe213e3f0cc260a9372049bef0fe02ab0a74f92c7379a83f2de64ec2ccb6b6df0efd15df8c672870e0966c
-
SSDEEP
1536:1i+N6u0utYGsoK2mEGIBp+WWN7YfEj77iZ76vVGU2AjK15t5uPpdrcIPWAWvnTX3:wYYutRQSc/7c6tJK7t5uPpdrxOhvnTn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2216 1956 7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe 93 PID 1956 wrote to memory of 2216 1956 7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe 93 PID 1956 wrote to memory of 2216 1956 7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe 93 PID 1956 wrote to memory of 4980 1956 7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe 94 PID 1956 wrote to memory of 4980 1956 7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe 94 PID 1956 wrote to memory of 4980 1956 7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe"C:\Users\Admin\AppData\Local\Temp\7dacb37610e680323d654261f9881495e11f24a1e14c53519771c1183e71a08a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:4980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD555d2fdd1432483e3ba86ebeccfe130b6
SHA17280b14d708800fd15303b2caa8628a0fbd7aa08
SHA2565cfd1668ec0e5f3b5f8d04e54091d6f173bede6e6f9bb418819fd550095139fb
SHA51236fd81128552356672b52936699c5e6362268c8131857e778e02a6862600c4feb20d13063d5f838e0887cb5083c648d39fe07faffba18c26387760752f9dd1f3
-
Filesize
144KB
MD52479e9d8c4486167a4e5d34f40b7c4df
SHA151ff4128c7847b32dc9d8a1ba24d523f00df87e8
SHA256572fa57976dee5dadd8ba1553203b4427337367aab81bc013746fe04c6cfd3e1
SHA5121e4a958634a2f74d542b8447c87535c25efc3f19d674d03e56eb5e9f66de54d23e19502e7b4dfff53963eb39211342ef175b62529f7e3affd1f2fb05f799f6ca
-
Filesize
338B
MD5a150ef14f69d25ab1d365ee1a8fb2c10
SHA13c6951b258dd00aba643ec43984a0490a3a5080f
SHA256ef2f34d22ab011364512182c174cf89c20ca9165e47238dd8cef9d2ecbee09ef
SHA5124cbedf17738765b1e2cc8953dabef974ccb47cad3c7212af1824451998ac51195fad2aafdb98b34913fd385fe505e7c387da8809d8afe3b6fb79ba465e5d70bd