Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 19:35
Behavioral task
behavioral1
Sample
Main.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Main.exe
Resource
win10v2004-20240426-en
General
-
Target
Main.exe
-
Size
9KB
-
MD5
591b69583b5d480dfc37ebe5d4147da2
-
SHA1
7f6f6a10809302ce31db85795a20fe35cc711246
-
SHA256
57592287aa0d69231dc808146ebcfd18ffd25c18639df768b353380f32526e48
-
SHA512
6004acc7286b951a490fc22ce347b4ab0e53e1af8d32bdbcd81118196a8c15a7a94df0d34cc00beb50d77b855d82085425ba516982de69da605ed3d7a0290b85
-
SSDEEP
192:XPWZn7j7S9g1/gINyzRhLSqFaNJhLkwcud2DH9VwGfct1zO:OZnzS9gtyzn3aNJawcudoD7Uu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Main.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 1368 b2e.exe -
resource yara_rule behavioral2/memory/3720-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/3720-11-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3720 wrote to memory of 1368 3720 Main.exe 82 PID 3720 wrote to memory of 1368 3720 Main.exe 82 PID 3720 wrote to memory of 1368 3720 Main.exe 82 PID 1368 wrote to memory of 2200 1368 b2e.exe 83 PID 1368 wrote to memory of 2200 1368 b2e.exe 83 PID 1368 wrote to memory of 2200 1368 b2e.exe 83 PID 2200 wrote to memory of 216 2200 cmd.exe 87 PID 2200 wrote to memory of 216 2200 cmd.exe 87 PID 2200 wrote to memory of 216 2200 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Main.exe"C:\Users\Admin\AppData\Local\Temp\Main.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\398E.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\398E.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\398E.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\Main.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\39EC.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD55ef49f0bbb9a43a0865635d0105d82e3
SHA102c52286bd9df5b7ba340f3ba531bc835483118e
SHA256da026fd7e3318b65d9d418d3c896251ccdfa12949bc2bf8ad655b2cf8c96c32c
SHA51217e5b4ce0cf027ef44b98ea6801e399d437f03e46aafbb40491922d3bbfdfbb08dcb823ba8ea29883333e6fdb0ad3083de5ff6610fbb55558b5b9ff0ce3019c9
-
Filesize
4KB
MD534fa12cee845d7ded3763362877a2fcd
SHA1015b75f28494865d401f13bdba021ccb03295a0b
SHA25676bfca848e6aae6326c0d2cb58ce10caec84951b344733e5bb5d736efafdbd19
SHA512d0f1fea8431b89834e74ea02f4917e9985a7c87e586832fb69ed17189ff28e18648b20e2c4e6b2d6b45c4f2432b12937625dca9feadd8ada70d566dcdc3690d2