Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
c67353b9c2dfd4bdcae92f6d7a34330a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c67353b9c2dfd4bdcae92f6d7a34330a.exe
Resource
win10v2004-20240226-en
General
-
Target
c67353b9c2dfd4bdcae92f6d7a34330a.exe
-
Size
53KB
-
MD5
c67353b9c2dfd4bdcae92f6d7a34330a
-
SHA1
a0f830b9b2457e3b46fd2f391c8a031e81385d34
-
SHA256
e8e87871c968dffe7f0e0916618560d0b89a2d1306adf4d6af1288f2ce3d9729
-
SHA512
6c1d93b8d33a3c4a2c1fb7bd028c7f15f81077b5898b9ef0dbf2b34e8f73e4e67e47037035ecd6dbb28acefc0b0e44c19a8b142f2097db214ece6677294d9503
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTbqjasqb:bIDOw9a0DwitDZzcTmy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation c67353b9c2dfd4bdcae92f6d7a34330a.exe -
Executes dropped EXE 1 IoCs
pid Process 5008 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2860 wrote to memory of 5008 2860 c67353b9c2dfd4bdcae92f6d7a34330a.exe 102 PID 2860 wrote to memory of 5008 2860 c67353b9c2dfd4bdcae92f6d7a34330a.exe 102 PID 2860 wrote to memory of 5008 2860 c67353b9c2dfd4bdcae92f6d7a34330a.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c67353b9c2dfd4bdcae92f6d7a34330a.exe"C:\Users\Admin\AppData\Local\Temp\c67353b9c2dfd4bdcae92f6d7a34330a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1412 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5548be4003a03d89f069da1cc50bc1bfd
SHA111e6893d6c729f5d40754fcc5c0d987a5ae307b4
SHA256d8d142036e98f1bd9d632273213524ab64c1c9bc5d7fe8b196ad384133dbd367
SHA512d178839481d0dd6d3fad12e1b78c3bf36e03dca744aeb8a189a310eb9c6126659798c2537019a2792cfca77ad5773f4d7641c0e2e5b4edf408ef75a290a99331