Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
d58c28185e85b18e718d862dffa1b0c3.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d58c28185e85b18e718d862dffa1b0c3.exe
Resource
win10v2004-20240226-en
General
-
Target
d58c28185e85b18e718d862dffa1b0c3.exe
-
Size
148KB
-
MD5
d58c28185e85b18e718d862dffa1b0c3
-
SHA1
8ac8e89db66bf61fbb10147e8198221af3260c33
-
SHA256
2a7dd1b648a75c49313e8289a3269eb27edf50c14f7378a70e825d86bc65c8e2
-
SHA512
83bf98fc5b7b0d0f0dba524339da2470aefa98a9c26a61afebaac03f1b74ebadc73ae92619146fb2fe4e5a01dc1751154cd458a807f3005e331f679db21a9c5a
-
SSDEEP
768:sUbcOKsHBKiUFf+bHnMwZdxjh+tBdxKKVu1fdYOUDHwBjPRLkSUX6vaR3:LmsHBKLNuXxdQuB1ft0oLk84
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation d58c28185e85b18e718d862dffa1b0c3.exe -
resource yara_rule behavioral2/memory/3288-2-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3288 d58c28185e85b18e718d862dffa1b0c3.exe 3288 d58c28185e85b18e718d862dffa1b0c3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4376 3288 d58c28185e85b18e718d862dffa1b0c3.exe 89 PID 3288 wrote to memory of 4376 3288 d58c28185e85b18e718d862dffa1b0c3.exe 89 PID 3288 wrote to memory of 4376 3288 d58c28185e85b18e718d862dffa1b0c3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d58c28185e85b18e718d862dffa1b0c3.exe"C:\Users\Admin\AppData\Local\Temp\d58c28185e85b18e718d862dffa1b0c3.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qwb..bat" > nul 2> nul2⤵PID:4376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD515fd0fa2bca2d3bc07a79b8fec2cc613
SHA1e8f0f83006752f3f8a7ab5bdb0158ac88244b54e
SHA2562bfe3d66cc90cda456b83a1fd7477e2e0066a67ceae51ca30fa75b36bba0ca5f
SHA512d5150e33b4e0e6b6221b8c3ccf72e2bac21f8b2faa3326abf55819c24b58f8cb1196416530e0d2ced3fce85d4e5e126b9bde63d6ed2a0e35d3328c980b90ee7d