Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
c5c610d5b50f0fb37b008a00a3da27c0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5c610d5b50f0fb37b008a00a3da27c0.exe
Resource
win10v2004-20240226-en
General
-
Target
c5c610d5b50f0fb37b008a00a3da27c0.exe
-
Size
66KB
-
MD5
c5c610d5b50f0fb37b008a00a3da27c0
-
SHA1
a4eb226dea01c50f6d82b8844996340ed995c5f3
-
SHA256
a2c530274f924ea7cdb18a0a95ee19a84606c78ea48b6f8663655f7c70db9533
-
SHA512
0d5310984dd795130dc881a6596c8eda57cf93850756c2cd80877f627ba4315a9def72fdedbc7fc9c565a0ee0e49f01c8ad7ebf57272a269cac5d3b8305dac82
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpE0P/xFY:6j+1NMOtEvwDpjr8ox8UDEpN/jY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation c5c610d5b50f0fb37b008a00a3da27c0.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2200 2056 c5c610d5b50f0fb37b008a00a3da27c0.exe 89 PID 2056 wrote to memory of 2200 2056 c5c610d5b50f0fb37b008a00a3da27c0.exe 89 PID 2056 wrote to memory of 2200 2056 c5c610d5b50f0fb37b008a00a3da27c0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c610d5b50f0fb37b008a00a3da27c0.exe"C:\Users\Admin\AppData\Local\Temp\c5c610d5b50f0fb37b008a00a3da27c0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD57f82c9c7ce3d2803f0cbe3da1ddec00a
SHA12ea3df12fb0af61b52067fe98da2655ecdb149d0
SHA256aad8c72d6e6c9957ee58a584aff22b9d5cd7fd72c2748b047b0a3d7556e2f19b
SHA512bf20291a77282988af06a7445e28c07bf34b942edf9e4cdb1f53150acca0e3a165fb899e7bc6f0202072ef7fe4d831c15c12a393a6c9274647ff13419ba5e6b0
-
Filesize
8KB
MD5b4873ed0102a82706b9a56b8ca30f92a
SHA147c30c6a8e0ed27cd6893f64236d71cb396d4c46
SHA256b2e4d67bbcad0e6d43ae467b50b0a8c336bdace20d36908889fcb4fb94b577bd
SHA51296276940f86bc9d0c1fd126de877aa87c2ecb66deda9a71c91a8da839e326ec6207f6365da77ace3b29e1e2c368ddcec56c39b4f10ce90a56b669fdea7e1abe1