Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe
Resource
win10v2004-20240508-en
General
-
Target
afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe
-
Size
56KB
-
MD5
004c9a309659a4fdcf25aae8083e4da2
-
SHA1
88483a4555ea6ab2609049863b0dac24cb8056dc
-
SHA256
afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124
-
SHA512
1cdbb0aaa75c9d23359ca6ea9db4a70c2a69dd9125e55be6365eef065804f6edc1d5e3a82157d576bba316f7e65a38b71ae783f5c2fe876410bb15a8d2d3fd6b
-
SSDEEP
768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxSHZFQQm:24Bobv7aB0EooYEC3rUVcYEZF9m
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe -
Executes dropped EXE 1 IoCs
Processes:
zbhnd.exepid process 3024 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exedescription pid process target process PID 1612 wrote to memory of 3024 1612 afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe zbhnd.exe PID 1612 wrote to memory of 3024 1612 afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe zbhnd.exe PID 1612 wrote to memory of 3024 1612 afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe zbhnd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe"C:\Users\Admin\AppData\Local\Temp\afa118c72b12db14fd7ab526a2e9018ea68cabfe1107202fa6ee43e5d927e124.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5ed4f1d4e1d081aaf42dacddafceba2de
SHA1cb9d93ca53cd1ce1d295268d608e419e801a7d95
SHA256bf7ed8f092cfc2efc85a7980a7654844938b09dc751239f27f9f57f53e35aea8
SHA512e1e161b0751b1864e4f2320efe6e72b5ec0592d603125560bec411aa53e2e9866081579195401ed3fbcfaf0b1270cbe11aa2c4388f15f4c438a2bcbdba360161