Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe
Resource
win10v2004-20240508-en
General
-
Target
f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe
-
Size
5KB
-
MD5
494ec0bf0df0286ecb7804d9a43ee49b
-
SHA1
fa61b9821d4f7e85e3e1dd4f777247f9e8212ceb
-
SHA256
f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1
-
SHA512
e8f15c688c208e7e8771366715b31c90a00c0ecfbf2f5698a259e70acd6e5ef4b333ada651c77572017d593c62a97b4e6297c33b894e22bcd718b162a90631e3
-
SSDEEP
48:qvECf6Am8RB/G965hkZNnZ1rsHB/VnC/RAxUl2CS70ALNx5vf:nCTxLSNnZuHnnwR2Ul2ClAhxZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe -
Executes dropped EXE 1 IoCs
pid Process 4708 lasma.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4708 1676 f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe 84 PID 1676 wrote to memory of 4708 1676 f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe 84 PID 1676 wrote to memory of 4708 1676 f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe"C:\Users\Admin\AppData\Local\Temp\f46e996293c9ed1d6dabbb1ab7ce76471d826532db797b2c99d083f58a9087f1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\lasma.exe"C:\Users\Admin\AppData\Local\Temp\lasma.exe"2⤵
- Executes dropped EXE
PID:4708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD56761fd12ec9820e6a0881484bbd33e75
SHA11617cbb54ea1a122d3fea870459aea46a5299f49
SHA256914a741d0fe8fc825d4ab8ed05d26d01f51f8b8540e2275b6b08c3e577703331
SHA51283654d3b73e56750a3e23e74493d3172382b7f5adae8eebea75b7597a5855cc8c50e8b981e9a4cd37f204634503d7eedfaf15774f8f0ec91d1b20910b2e4e78d