Analysis
-
max time kernel
87s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
d3bd18e48417b649f1d8279d77ca81f8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3bd18e48417b649f1d8279d77ca81f8.exe
Resource
win10v2004-20231215-en
General
-
Target
d3bd18e48417b649f1d8279d77ca81f8.exe
-
Size
34KB
-
MD5
d3bd18e48417b649f1d8279d77ca81f8
-
SHA1
3704bd6de7dd96f71ca7af439890a217502c66d6
-
SHA256
159c54d381cc50862ded37b11e3767c050c5346258e7c9036bcad4a893b8d5f8
-
SHA512
f0e19432e5e9f05918c58fb1d4875406dc83747a3ef1f59ecc90a062b2fa494d2a8cf4a700db18693ce4ade3b3d04eb76fd8c5387e8c59759244783c6ad8cbe9
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cuM9JYUGVZ7pVWe:bAvJCYOOvbRPDEgXRcuM9HGVZtl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation d3bd18e48417b649f1d8279d77ca81f8.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 4952 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4952 1572 d3bd18e48417b649f1d8279d77ca81f8.exe 85 PID 1572 wrote to memory of 4952 1572 d3bd18e48417b649f1d8279d77ca81f8.exe 85 PID 1572 wrote to memory of 4952 1572 d3bd18e48417b649f1d8279d77ca81f8.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3bd18e48417b649f1d8279d77ca81f8.exe"C:\Users\Admin\AppData\Local\Temp\d3bd18e48417b649f1d8279d77ca81f8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD542e2c34028121094683255756eb88ecd
SHA14b7d3b7f409b16d6de85710599851453dbdbadc8
SHA256961f58749a686d52b469cf64c3c3878942d842894ca1f83bba8f38860e1ca8d4
SHA51222e1c42b30b629b20df744210087a0de0c2bb4518820278f0f4d8e5f3538da67ee8e51114309c5e206b178bf049163ef635d193518fdd593f6cfca4e7d5cd9ed