Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
72d9ba6bcbf04a52e0b048362d9f715d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72d9ba6bcbf04a52e0b048362d9f715d.exe
Resource
win10v2004-20240319-en
General
-
Target
72d9ba6bcbf04a52e0b048362d9f715d.exe
-
Size
40KB
-
MD5
72d9ba6bcbf04a52e0b048362d9f715d
-
SHA1
bd68238ea4b700fe6f0f275117efa1a067422a71
-
SHA256
da1a8867a59465927a6fd3926865fa6c5c7d44d856f1091c1bffae1bc64f7025
-
SHA512
cc863097f338312ab5433519cdac34f84cad19e28597d6c3568c4054f14a8c2ae96691e875d19c3a83b1d4cd4076d9049996df9744670ccb9bd7c0c9b3a32dea
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzoiM8Nekdvjl9V50i3NbF0Qki:bAvJCYOOvbRPDEgXrNekd7l94i3pF0g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 72d9ba6bcbf04a52e0b048362d9f715d.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 5056 4068 72d9ba6bcbf04a52e0b048362d9f715d.exe 96 PID 4068 wrote to memory of 5056 4068 72d9ba6bcbf04a52e0b048362d9f715d.exe 96 PID 4068 wrote to memory of 5056 4068 72d9ba6bcbf04a52e0b048362d9f715d.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\72d9ba6bcbf04a52e0b048362d9f715d.exe"C:\Users\Admin\AppData\Local\Temp\72d9ba6bcbf04a52e0b048362d9f715d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3892 --field-trial-handle=2232,i,3915538061666887171,15629965885515244134,262144 --variations-seed-version /prefetch:81⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5adf0f6b896acdb94592048190f7b177b
SHA128c1d8601890ab718958b9f8f2242a8d97864087
SHA256456337ab2914b59dce77c08d35edc8169f45d30bf851d4a68f78cc7afd1c0f91
SHA512ac7801eb14124a219eb523e990ae737118a2a618f2dfd9f75f9beb874f2eaaabf821eb5aa990c647ef17f5d7b9e808a799b2e43db318fe1c8d79afb58bfb1397