Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe
Resource
win10v2004-20240611-en
General
-
Target
f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe
-
Size
33KB
-
MD5
1837c19a4a36695c35ea2f93eecf1f21
-
SHA1
885dc4ba2af2ae93cc8e0cadc272bb212ab510f0
-
SHA256
f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479
-
SHA512
f6d8f0c75e09041ba18023ffcb1256f80883347b52219d2396c285dc071d58d4c9f88b436971c3ef4f7181f3e1a490a587076fc799659b862b2c887c0d4dd79c
-
SSDEEP
384:FFnwR2IT1XKqC9YATzWLkAzFAll6EPDLO7nsBGXNOglZyF:LwRrT16WFFAv6EPDSEGgg4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe -
Executes dropped EXE 1 IoCs
pid Process 4888 vitra.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 4888 2380 f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe 82 PID 2380 wrote to memory of 4888 2380 f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe 82 PID 2380 wrote to memory of 4888 2380 f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe"C:\Users\Admin\AppData\Local\Temp\f0e100dca986d5c699f0f9e861739a36728c801b7e2aea9085f795ee3ded3479.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\vitra.exe"C:\Users\Admin\AppData\Local\Temp\vitra.exe"2⤵
- Executes dropped EXE
PID:4888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD556f87b0c0ba0ba7b87a16579dd813902
SHA100196cdcc1458b6907dbbcde0d5f5b0a16fa8e48
SHA2560190d5f31ff2fd77ac2cf727e1b9df2977f93ce0367e9db7d75e0750231a19e1
SHA512023adaff805933380bb41d4c430916246635f1d4826e857e1efb22116ab9b541812c9810f2fe212e2893de067fe20ccf6cee42d715e7dbeb98819c106380a15c