Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 22:10
Behavioral task
behavioral1
Sample
38288ab5c1405276f7bf25d3a516062e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
38288ab5c1405276f7bf25d3a516062e.exe
Resource
win10v2004-20231215-en
General
-
Target
38288ab5c1405276f7bf25d3a516062e.exe
-
Size
58KB
-
MD5
38288ab5c1405276f7bf25d3a516062e
-
SHA1
0bcfad9b24f54e7a19e98a7041d92c5d68707d14
-
SHA256
751cb4806c4556a7130de89a9ad8d81e6c6d7a30c7c7e27c96203f739786263f
-
SHA512
383637b13898981d0a628a4b8ec808c8a35e913a4c2795721342c5b42b45aca61b279d0dd47ebb91a488b6c91ab8d5ae8c887dacc78543a810eda9d64f149ea5
-
SSDEEP
1536:AEPpS76ydzGej0d4K20n2eN6RXBuOkDjprs/yy:AqS/dzJIr2q2eS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 38288ab5c1405276f7bf25d3a516062e.exe -
Executes dropped EXE 1 IoCs
pid Process 1840 conwurm.exe -
resource yara_rule behavioral2/memory/3588-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/files/0x000d00000002315a-7.dat upx behavioral2/memory/1840-11-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3588-14-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1840-15-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1840 3588 38288ab5c1405276f7bf25d3a516062e.exe 84 PID 3588 wrote to memory of 1840 3588 38288ab5c1405276f7bf25d3a516062e.exe 84 PID 3588 wrote to memory of 1840 3588 38288ab5c1405276f7bf25d3a516062e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\38288ab5c1405276f7bf25d3a516062e.exe"C:\Users\Admin\AppData\Local\Temp\38288ab5c1405276f7bf25d3a516062e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\conwurm.exe"C:\Users\Admin\AppData\Local\Temp\conwurm.exe"2⤵
- Executes dropped EXE
PID:1840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD52f4205205e96660ae1c1eea4a019f972
SHA14ed014dbb66ef5c574b2bf921c357efef3cf4798
SHA256fbad65790e0bea578deaf61cf1c84529144a4aeecf9beaab86786f8fad860c9f
SHA512b4426dd6d4b2b4ff76156dd7db387b55203d546af290f47b7ba7049e41e247a742fde93e3639faa3de43af758c5e884b0cce24423a1f8d5ddf0e4f51e5d966a8