Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe
Resource
win10v2004-20240426-en
General
-
Target
05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe
-
Size
89KB
-
MD5
34997f51cd57e9c0935019b7f71a4af2
-
SHA1
f40f193d1e2980f5a79c6ba8259f5e1cc60f3c93
-
SHA256
05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d
-
SHA512
155a94017fe7cb2fd54cdf458aade27ab90e2bbc2bdc2d9bb2088f857cc315f5602d0d436b163e10ab5809d3d922c29ba160dbf1d407bd6f2e7410c5b13d3923
-
SSDEEP
768:6EH+0nokYnRUsZ4qM3UXIgnA/iyl3RJB1oKiO4T6qClHZOpv0HX15xwD+Pg:VH+dJRhBU3fAKiODhsyDxwDOg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1616 05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2228 1616 05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe 89 PID 1616 wrote to memory of 2228 1616 05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe 89 PID 1616 wrote to memory of 2228 1616 05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe 89 PID 2228 wrote to memory of 2076 2228 cmd.exe 91 PID 2228 wrote to memory of 2076 2228 cmd.exe 91 PID 2228 wrote to memory of 2076 2228 cmd.exe 91 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2076 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe"C:\Users\Admin\AppData\Local\Temp\05cbb3f73b37e56c85fe892f68ea19793ad118589ab81b942376a87f4a61096d.exe"1⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +i +a +s +r C://Users//Public//Documents//ttd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\attrib.exeattrib +i +a +s +r C://Users//Public//Documents//ttd.exe3⤵
- Views/modifies file attributes
PID:2076
-
-