Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 15:24
Static task
static1
Behavioral task
behavioral1
Sample
e1fdbfe2d5b8d35255d29d996a89f3dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1fdbfe2d5b8d35255d29d996a89f3dc.exe
Resource
win10v2004-20240319-en
General
-
Target
e1fdbfe2d5b8d35255d29d996a89f3dc.exe
-
Size
208KB
-
MD5
e1fdbfe2d5b8d35255d29d996a89f3dc
-
SHA1
a5fad1e1b5a4bc24c7183361392b03c1c016baaa
-
SHA256
6847bfce1091e64866e9f76271f2758ca8f4cbeb27ab183033e87f9f6e75fd74
-
SHA512
f55e7818bb971cd10fa87c93580d2829e7892b7ffbff024d7abd62d6d42eb77c37a1427f5a8cdd49153a750c79b0edf539b28371c3535688366d5ca57d623701
-
SSDEEP
3072:7ChJgYMm4xf9cU9KQ2BxA59SPMqOogn2:XYMm4xiWKQ2BiCM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation e1fdbfe2d5b8d35255d29d996a89f3dc.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\3dcaf45e\jusched.exe e1fdbfe2d5b8d35255d29d996a89f3dc.exe File created C:\Program Files (x86)\3dcaf45e\3dcaf45e e1fdbfe2d5b8d35255d29d996a89f3dc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job e1fdbfe2d5b8d35255d29d996a89f3dc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2172 4776 e1fdbfe2d5b8d35255d29d996a89f3dc.exe 96 PID 4776 wrote to memory of 2172 4776 e1fdbfe2d5b8d35255d29d996a89f3dc.exe 96 PID 4776 wrote to memory of 2172 4776 e1fdbfe2d5b8d35255d29d996a89f3dc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1fdbfe2d5b8d35255d29d996a89f3dc.exe"C:\Users\Admin\AppData\Local\Temp\e1fdbfe2d5b8d35255d29d996a89f3dc.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files (x86)\3dcaf45e\jusched.exe"C:\Program Files (x86)\3dcaf45e\jusched.exe"2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2264,i,7994609493164365963,13212734413040148104,262144 --variations-seed-version /prefetch:81⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD589931a70501a3362b6823b53523f5a77
SHA188c7e199c462ed8cc3af0ba453512b5b1fdcfdb5
SHA256d30d9a0e64bc9f4a306617f087f30de6d57a5413793ab7bde13a299777a1b254
SHA5128fa7ab4824ae86f3f47b3718c11f79ef275dd0639396572eaeb1262ad9153ccf43c633a7b292e30c97370436a09f22fbcf817a802015650ffb1f84d2b83483bd
-
Filesize
208KB
MD537018edef6dee64df6e1e06fad7686a7
SHA18efab9f5f5e9c9a375872061add0b1484af9a4c2
SHA2563109ce49eef57f42cc4acaa7e3c36bd2db9f7a9d398fb054fa17e87e5ef29939
SHA512c4c34ef283c6483ade259afdf5af588dba969f5e900110b2983b1458528e07268914e796f4067121067a624a5ebb74977853b0df6594051215c73fd99c544f90