Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe
Resource
win10v2004-20240426-en
General
-
Target
10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe
-
Size
17KB
-
MD5
b517d3393e485617d7fc81162cbaf96b
-
SHA1
0e99d2afa8077f4c28787710b2c3c0b0d2a177e2
-
SHA256
10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180
-
SHA512
e36474930439d7691d08db5050b2efca2e7bbfc348c4094777ad304aaa5cd171c6ca5b24810ab15f984fd0020e8402b1c98cc4b149137f337436c88ad438eb29
-
SSDEEP
192:kRQ9GnwR2M5AHrzjR3OmaFA0Kz649M3Q9aXqjU6Fowfugi:LcnwR2M50zV4LKJ9MyUTCE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 hromi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1516 4048 10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe 83 PID 4048 wrote to memory of 1516 4048 10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe 83 PID 4048 wrote to memory of 1516 4048 10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe"C:\Users\Admin\AppData\Local\Temp\10f283a5c051799796440ab7b97583dc4175ad63e8ce2803cc1786ceec10c180.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\hromi.exe"C:\Users\Admin\AppData\Local\Temp\hromi.exe"2⤵
- Executes dropped EXE
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5db555bd48b18c0ef48423c8985e52be7
SHA112f2bc40442bcde7ba4da2d854fa7129c9a706c3
SHA256aa3cb529a4d9b766efa396a56152839fa7f26798a492748c9f5e48d0b02cc991
SHA5128d3aa929c05a4c3f5d577afa603a5c1967bcf9e4012d93b46e5e8ce54f344128c04f0a4d9a261fb30c0bbf9ee3a2ff312cdceca22bddc403bcc2a3f076cae9b1