Analysis
-
max time kernel
88s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
ce8cf3db796e3a48ab654d989267f807.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce8cf3db796e3a48ab654d989267f807.exe
Resource
win10v2004-20231215-en
General
-
Target
ce8cf3db796e3a48ab654d989267f807.exe
-
Size
33KB
-
MD5
ce8cf3db796e3a48ab654d989267f807
-
SHA1
070b390adf110d7158e9c5ae903aee192073f612
-
SHA256
a7d05063acc6ea4a868d10a6afe21170d4ffff8ff5abef728a8690ebc9ffae94
-
SHA512
0a64c30f3ef8c77ee4f788263565de439f9acfb2cb40d2adeb8f437c518ac5fa81959509510837e81c4243a1a6a47b88bfb575ffeef3166f25860f38bec1a265
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6c3l8Sz901:bAvJCYOOvbRPDEgXRc3SSzy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation ce8cf3db796e3a48ab654d989267f807.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 1812 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 1812 4960 ce8cf3db796e3a48ab654d989267f807.exe 84 PID 4960 wrote to memory of 1812 4960 ce8cf3db796e3a48ab654d989267f807.exe 84 PID 4960 wrote to memory of 1812 4960 ce8cf3db796e3a48ab654d989267f807.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce8cf3db796e3a48ab654d989267f807.exe"C:\Users\Admin\AppData\Local\Temp\ce8cf3db796e3a48ab654d989267f807.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD59a79b1bb3deed5314c597c712287db9c
SHA157dfc44d8e2d272ba2ead85cb17c06e974cbca82
SHA2569f8eb45cc7b228cdcf84823bad9521d079dcefd54fc204dbf1e3fed20e9d44cb
SHA512d9478e6ab65e033a2c1da26568b11e150ad9d55319a46e038999a48e2659064e3578d471444978b321f904a72ca14f90d103efe44714cc16e1cb2607e985e55e