Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe
Resource
win10v2004-20240426-en
General
-
Target
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe
-
Size
56KB
-
MD5
b342deb33875244f22887978925f9867
-
SHA1
580fa51b67f04de93632685a8fe93f8698084e16
-
SHA256
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1
-
SHA512
459e77014c9b635bb6c6ad158519f111dcadb76a0e304ac8b639f03cb97c1f26a60992c0e6ad2b91d03338fd26f84a14cbd2c6ade03aec77d183a92bb823be3c
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTb8pup:bIDOw9a0DwitDZzcTLp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2936 1640 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe 82 PID 1640 wrote to memory of 2936 1640 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe 82 PID 1640 wrote to memory of 2936 1640 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe"C:\Users\Admin\AppData\Local\Temp\0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD57a73337ec0560d0c6ec7cab9395b931f
SHA178679d8df5494fa6ecd289c6a8dcd287df261ab1
SHA2565c0707d8ad6bacb929240813e8dcc3f7439bdc5a253eb6357e3d5682d52e1a48
SHA512ad4a46b6547456689f6f56663c12b0314e055134cb8b238a0139f39b31d8abbff7159d6882aedbefe9427fa83311e967deb91fc3ea25d4e131f92da8ffb1937a