Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
General
-
Target
file.exe
-
Size
662KB
-
MD5
0dd1f6c2b9bf477115701a1340d8d9a2
-
SHA1
7b074f54130217609435efe3f45ba38d363dd381
-
SHA256
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711
-
SHA512
a3c8bcc7fe527eb2de6a6dd230bca9b4424653c6e251c1113bc27bd8c42cf79e1be1974e20c733e51be38f2c222ee1338257fd86209f2411f86e5f65213206e6
-
SSDEEP
12288:GubsNSOetfARQAPyGUu7zNubsNSOetfARQAPyGUfT+tkrvdv:GubsnafAPyjSzNubsnafAPyjZrvh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation work.exe -
Executes dropped EXE 4 IoCs
pid Process 4244 work.exe 4460 pogflaw.exe 4624 wfejcax.exe 4824 wfejcax.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wfejcax.job pogflaw.exe File opened for modification C:\Windows\Tasks\wfejcax.job pogflaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4460 pogflaw.exe 4460 pogflaw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4476 wrote to memory of 844 4476 file.exe 84 PID 4476 wrote to memory of 844 4476 file.exe 84 PID 4476 wrote to memory of 844 4476 file.exe 84 PID 844 wrote to memory of 4244 844 cmd.exe 87 PID 844 wrote to memory of 4244 844 cmd.exe 87 PID 844 wrote to memory of 4244 844 cmd.exe 87 PID 4244 wrote to memory of 4460 4244 work.exe 88 PID 4244 wrote to memory of 4460 4244 work.exe 88 PID 4244 wrote to memory of 4460 4244 work.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
-
-
C:\ProgramData\xotkb\wfejcax.exeC:\ProgramData\xotkb\wfejcax.exe start21⤵
- Executes dropped EXE
PID:4624
-
C:\ProgramData\xotkb\wfejcax.exeC:\ProgramData\xotkb\wfejcax.exe start21⤵
- Executes dropped EXE
PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
335KB
MD5577cc10d77b4ee44f8613fc7df186048
SHA11d188a807f9a7c55f62ccd4820fe8b89fb8d9e8b
SHA256e871608d80293f723b1f44f465054f8a6528c2b0354435b9360aeb849a29701c
SHA5126183b03eaeb88e8ea1ef2ccedb65cbd04fc05c028ce8e2f9e0aed6636717e1e7c9994a8fb9cf4ebf36e277618db7f612a2af4557749b1f6ef6c2b115837618fa
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e