Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
d365f7ec48e7fb185caa60f43a9fdc4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d365f7ec48e7fb185caa60f43a9fdc4d.exe
Resource
win10v2004-20240508-en
General
-
Target
d365f7ec48e7fb185caa60f43a9fdc4d.exe
-
Size
38KB
-
MD5
d365f7ec48e7fb185caa60f43a9fdc4d
-
SHA1
faf30ec0c53757e0b9795c584689a472031333f4
-
SHA256
3d1808a4ae37df891fb3ee54c5dc2728214a9a5508e65f306963a1eff0a223cf
-
SHA512
8c9e711d94997081983dd8b663c65f96738e5c8a817538d35120549670b30f5e6ed63b93f139104814fb47ec15ada400f75039a575d5b15b4b4b24324b108e90
-
SSDEEP
768:bAvJCYOOvbRPDEgXrNekd7l94i3pQheDZs:bAvJCF+RQgJeab4sba
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation d365f7ec48e7fb185caa60f43a9fdc4d.exe -
Executes dropped EXE 1 IoCs
pid Process 3080 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3080 3040 d365f7ec48e7fb185caa60f43a9fdc4d.exe 80 PID 3040 wrote to memory of 3080 3040 d365f7ec48e7fb185caa60f43a9fdc4d.exe 80 PID 3040 wrote to memory of 3080 3040 d365f7ec48e7fb185caa60f43a9fdc4d.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\d365f7ec48e7fb185caa60f43a9fdc4d.exe"C:\Users\Admin\AppData\Local\Temp\d365f7ec48e7fb185caa60f43a9fdc4d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Executes dropped EXE
PID:3080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD51837e6b7ab67d769e952d385aa86e4a6
SHA189e62c1704f552f22f16635b131eb8bb9c2c1086
SHA256a076603baddcdb906256ade3e04047cb050315ca033b837e9ee0dc4497923bc1
SHA512384d054a2a66267dc63f8a092e750c3ccb835ace63ad24264856df0bbd03ff9a908a068fc9ce2cfde5d41978996805ead59fd1e33e621c70658f4bae24d4090e