Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 03:48
Behavioral task
behavioral1
Sample
da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe
Resource
win10v2004-20240508-en
General
-
Target
da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe
-
Size
56KB
-
MD5
204c0ea4a859f114859f243ba6c62057
-
SHA1
b68ad81deadd5c3dc60d938118c1556c6921d3b0
-
SHA256
da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead
-
SHA512
8c42fbd4c20f25a9d6c7824f1d944275e9a9b9a2b5f29aa832e454c9fedf37615123db0231c539dbaf6ebc3050aad778fd06441d8a72f8a2526c61f48c1554b8
-
SSDEEP
768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsG5t:r9l+W8xFt6sh7iQroCoRB0u0sY
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/3392-0-0x0000000000400000-0x000000000040F000-memory.dmp UPX behavioral2/files/0x00070000000232a4-7.dat UPX behavioral2/memory/3392-11-0x0000000000400000-0x000000000040F000-memory.dmp UPX behavioral2/memory/4376-12-0x0000000000400000-0x000000000040F000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe -
Executes dropped EXE 1 IoCs
pid Process 4376 bkgrnd.exe -
resource yara_rule behavioral2/memory/3392-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00070000000232a4-7.dat upx behavioral2/memory/3392-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4376-12-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3392 wrote to memory of 4376 3392 da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe 82 PID 3392 wrote to memory of 4376 3392 da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe 82 PID 3392 wrote to memory of 4376 3392 da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe"C:\Users\Admin\AppData\Local\Temp\da98c0146232931eacc17bca42a401f463810cce080d5e490ba36099ff3b5ead.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
PID:4376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD50adf510c0a3b612cc5cd66bffc623ae3
SHA1f34821567670fc4d038dad5349e0f15a8652fb26
SHA256e822cd6ee6670980ec4b8f63c82500dd8e48ef58012dc4042d0510b6248c73cb
SHA512f46715fcc787730fc79d770c6def01a57b75779852b592dbc5256cdbb1f230f7d8dc1b962ad31d54f3eebf8f9e53e07cf7c389457aa168f74c8242968bda201b