Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
b0ec505ad10e7e4dd86ceb2d35693e58.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b0ec505ad10e7e4dd86ceb2d35693e58.exe
Resource
win10v2004-20240226-en
General
-
Target
b0ec505ad10e7e4dd86ceb2d35693e58.exe
-
Size
30KB
-
MD5
b0ec505ad10e7e4dd86ceb2d35693e58
-
SHA1
30dbceb806db8e82e9badbbd0c0d4ae6e4ec07bb
-
SHA256
b53c749c59757ad6567c5d2bb43b296a27d5daaef09153a0f69bacd2978dd69c
-
SHA512
f0f84a028b351352df3772e49d04a0266fbcc6b3e019f54648615b508bf308f90f7afbb83e498cde632c4e9704d5ea4aced3779a79ced249d15b5cee28734d72
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn+p8Z:b/yC4GyNM01GuQMNXw2PSjU8Z
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation b0ec505ad10e7e4dd86ceb2d35693e58.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3744 wrote to memory of 2260 3744 b0ec505ad10e7e4dd86ceb2d35693e58.exe 90 PID 3744 wrote to memory of 2260 3744 b0ec505ad10e7e4dd86ceb2d35693e58.exe 90 PID 3744 wrote to memory of 2260 3744 b0ec505ad10e7e4dd86ceb2d35693e58.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ec505ad10e7e4dd86ceb2d35693e58.exe"C:\Users\Admin\AppData\Local\Temp\b0ec505ad10e7e4dd86ceb2d35693e58.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD581e22ff6ea4066c7092171f6a0d2eadd
SHA111f2330509aa9ef108b11cbf16244d9c20dee887
SHA25678cf33194d79071ec32d5e3e5ae9467eb0ab8796096449c4a6ac4e8df12d7ae7
SHA512289f1317dd96bef99e35655f0a6ee9c353ea208fc837eb17532ad2fbf4488c596bb81d3066fcbbc9043f05822b0aac1068ba0ebc355dc94bd93bd5fc6bf0c20a