Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe
Resource
win10v2004-20240508-en
General
-
Target
0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe
-
Size
40KB
-
MD5
166ad1aa9afcfafb52e4ed3c00292218
-
SHA1
b67d51ebba1146951a07eb5619d4c64469aaa4a7
-
SHA256
0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035
-
SHA512
d551af7b4297d0dbeb139a13e1d8c1f8a7e69f1247fdfb24f80d5885cbda78f768665f10480e1054dded3af1590b7ca9d525c6580752c5660f806b588a154516
-
SSDEEP
768:A/E+UlejKbjWwKtUZS6KUAghE3c1ng8o6dlZYsp:AC2tUZdHAMEyngBISo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe -
Executes dropped EXE 1 IoCs
pid Process 400 edxmk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 400 2604 0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe 85 PID 2604 wrote to memory of 400 2604 0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe 85 PID 2604 wrote to memory of 400 2604 0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe"C:\Users\Admin\AppData\Local\Temp\0b90ef1ddb39246ac0543cb9265739d49dfdedc3f011715d82ccea4bbcaca035.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\edxmk.exe"C:\Users\Admin\AppData\Local\Temp\edxmk.exe"2⤵
- Executes dropped EXE
PID:400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5064b4c65dd44e2ff653d7971ade681ca
SHA1f28039b2f2d8db7fd1454fbefd5f39cc72488951
SHA25635346440a9825caa78ca07cdc3a0bfdfb92c71860296dbbed06e6ee50cc35462
SHA512d73243e8fe7e1f01f254a8a2361f5adb187eb99ed8792a849f12d7a75e74bf13015bd5a6a85e8a6955e7a49a7fa0ceeb40b05b5bb4c579171b552ee0279c9870