Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 02:16
Behavioral task
behavioral1
Sample
b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe
Resource
win10v2004-20240611-en
General
-
Target
b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe
-
Size
35KB
-
MD5
73087bb93ac07f158534aa3a7335fe35
-
SHA1
e799f4899feaae339764115f33b30a52a83e4462
-
SHA256
b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e
-
SHA512
c4cc0ca9e6848786caa8724663324c21bcff1af9615acae60d980173ca939516942137f4b76970ad5684479b31d337fe2a211cbf7050515dba16598300bc7348
-
SSDEEP
768:N+/5kqPgZWZwOmso3OQ9fkeVMZjuNz1ZnTgmgJTw10PP+7:Gi8SWZwORZpduTZvWPPA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe -
Executes dropped EXE 1 IoCs
pid Process 5036 kyyjs.exe -
resource yara_rule behavioral2/memory/976-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x000a000000023410-6.dat upx behavioral2/memory/5036-13-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/976-14-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/5036-15-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 5036 976 b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe 84 PID 976 wrote to memory of 5036 976 b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe 84 PID 976 wrote to memory of 5036 976 b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe"C:\Users\Admin\AppData\Local\Temp\b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\kyyjs.exe"C:\Users\Admin\AppData\Local\Temp\kyyjs.exe"2⤵
- Executes dropped EXE
PID:5036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5a3f15ea9706d107d8adec698b1d7728e
SHA12d513989791fa667b34a3229696d31f005069166
SHA256d41836bf9e36d8d0f2b84391f2dff249a993571c869d1d91b2d940b5b51e5a4d
SHA512a7fc3b73b1c8356d21b871b33b15c3579b0c4be652ac0a273ac91c00904333be4bc71230bb6d6bcecb66608a86903f5bc573bd5bb2da76024fa856e9d2c33c6e