Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
d44255f79b1577c83129f48d49cb3230.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d44255f79b1577c83129f48d49cb3230.exe
Resource
win10v2004-20240226-en
General
-
Target
d44255f79b1577c83129f48d49cb3230.exe
-
Size
115KB
-
MD5
d44255f79b1577c83129f48d49cb3230
-
SHA1
5c17d130bba915db601854257e1d1bb860de4a76
-
SHA256
1709929db6a4d9dfcc74284e50a2e1420eb7ed1229a762464a556ccea3cc9ab2
-
SHA512
05d3537083535059698d4cfafb7b10511014174ffd22142c4f792a8d565f2a96ac4c9c3164b0a76d012dd7f51a34f13784f260c0fd873b4a24bc52b82bd37b25
-
SSDEEP
3072:rvkGO9TMGNG0WycxnvdwOxQZbGL6msFhx2DmxA2:TkGmMGky+iO+GCh0DMz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation d44255f79b1577c83129f48d49cb3230.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 840 wrote to memory of 1476 840 d44255f79b1577c83129f48d49cb3230.exe 91 PID 840 wrote to memory of 1476 840 d44255f79b1577c83129f48d49cb3230.exe 91 PID 840 wrote to memory of 1476 840 d44255f79b1577c83129f48d49cb3230.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d44255f79b1577c83129f48d49cb3230.exe"C:\Users\Admin\AppData\Local\Temp\d44255f79b1577c83129f48d49cb3230.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Eqb..bat" > nul 2> nul2⤵PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5885f1d884698920e4d67119537a99b6d
SHA1a32873b01999f3890c14a9bafed33766ba5623bf
SHA256cad29809bd084b6b9332031551751c2fa8e8d8bebf4e1c9d664776016e413de7
SHA51248d85684fa530a3fb1f0d18bce45667a1b81569a4a089ac86245abef03d16bd373ef40b835ed489f32b79c7bcd8e88d4c510c7e780af6ad9c24c02c46e13c5b8