Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
17a2bd37205afd412dd1137079d8dab7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17a2bd37205afd412dd1137079d8dab7.exe
Resource
win10v2004-20240508-en
General
-
Target
17a2bd37205afd412dd1137079d8dab7.exe
-
Size
14KB
-
MD5
17a2bd37205afd412dd1137079d8dab7
-
SHA1
a8d1e3dfa12c531fcb22e97399b53d55f4fa0394
-
SHA256
f50b0c9c8a17ee4cee8f4d4921ffd918ec861668b249ec50ff2d2cec3ee52c0e
-
SHA512
a10c6ef797b224f7294f01d831e8ab8feb81868082118cee0ee612d33f5c880bc03013cb2af769b5c0a726a30b81d1c458070ca29c99c085e7bd708690bda3fb
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhJSn:hDXWipuE+K3/SSHgxS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation DEM5C92.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation DEMB2F0.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 17a2bd37205afd412dd1137079d8dab7.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation DEM597A.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation DEMB026.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation DEM673.exe -
Executes dropped EXE 6 IoCs
pid Process 2928 DEM597A.exe 1816 DEMB026.exe 1772 DEM673.exe 3636 DEM5C92.exe 2864 DEMB2F0.exe 312 DEM96C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2928 2716 17a2bd37205afd412dd1137079d8dab7.exe 89 PID 2716 wrote to memory of 2928 2716 17a2bd37205afd412dd1137079d8dab7.exe 89 PID 2716 wrote to memory of 2928 2716 17a2bd37205afd412dd1137079d8dab7.exe 89 PID 2928 wrote to memory of 1816 2928 DEM597A.exe 93 PID 2928 wrote to memory of 1816 2928 DEM597A.exe 93 PID 2928 wrote to memory of 1816 2928 DEM597A.exe 93 PID 1816 wrote to memory of 1772 1816 DEMB026.exe 95 PID 1816 wrote to memory of 1772 1816 DEMB026.exe 95 PID 1816 wrote to memory of 1772 1816 DEMB026.exe 95 PID 1772 wrote to memory of 3636 1772 DEM673.exe 97 PID 1772 wrote to memory of 3636 1772 DEM673.exe 97 PID 1772 wrote to memory of 3636 1772 DEM673.exe 97 PID 3636 wrote to memory of 2864 3636 DEM5C92.exe 99 PID 3636 wrote to memory of 2864 3636 DEM5C92.exe 99 PID 3636 wrote to memory of 2864 3636 DEM5C92.exe 99 PID 2864 wrote to memory of 312 2864 DEMB2F0.exe 101 PID 2864 wrote to memory of 312 2864 DEMB2F0.exe 101 PID 2864 wrote to memory of 312 2864 DEMB2F0.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a2bd37205afd412dd1137079d8dab7.exe"C:\Users\Admin\AppData\Local\Temp\17a2bd37205afd412dd1137079d8dab7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\DEM597A.exe"C:\Users\Admin\AppData\Local\Temp\DEM597A.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\DEMB026.exe"C:\Users\Admin\AppData\Local\Temp\DEMB026.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\DEM673.exe"C:\Users\Admin\AppData\Local\Temp\DEM673.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\DEM5C92.exe"C:\Users\Admin\AppData\Local\Temp\DEM5C92.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\DEMB2F0.exe"C:\Users\Admin\AppData\Local\Temp\DEMB2F0.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\DEM96C.exe"C:\Users\Admin\AppData\Local\Temp\DEM96C.exe"7⤵
- Executes dropped EXE
PID:312
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD505d504de3f3aca0e2aeb201324044c40
SHA102f9697a64f1e8819c103eb5118e32b7dbd437e4
SHA256ee732693171b59a976b680293ace759c890b0305e242f52318a249fabb972470
SHA51210c6341d6ca15dbb13b583b7dc116fdfe612413481832a06cfcbe9a32be7f030f82caec00a46ce1b119f3980f90a52ff72fc718f292794712f4ca78fd549f13f
-
Filesize
14KB
MD51c7d982331ce882c74bd542dc8d0339e
SHA1a9b0d9c11cf3fbf5f09fce8897e4a30b653d8ede
SHA256e0f6bbf76b313b561b90f2d10074cb903e51d84e881c0065eb4bae48624ae374
SHA512f9e6dc534904ca129c61a3ccdd7a5b67cadf7dd47c85cedcd4e7ca3679cc84953dcb6c0c95b6eace032a8d8f6142131e14a48f3f1198f2189fad8933f7d4ea3b
-
Filesize
14KB
MD563e6ca28ae87d2f5b8e0aac65614b6f1
SHA1158f0e0f3b03f6f76023902a5768185427cf480e
SHA256bd1288e18afae566fb8abe6bdc9c30f5175a359804f33659b8e280ad6e9ce592
SHA512a32e82bf9e631d83e596eb23ca6796908d466a507f15be913d4d4c2e61bf7ce81dfc0095cd28d6e58f2ff9a71049001cb0ad3607e7af4c3c0887aa937da2a829
-
Filesize
14KB
MD5a7402b410dcf5b0f34546f0a9988035b
SHA1c997061287b145defbdbbe517227d2063cb28c8f
SHA256920566a59193dca96dc7ac8870902203647dd8522a9960aded18c3197eabee78
SHA51285ffe30586401e32cae1e5308adffb4e20a422b6d8ec8e28eddf14428d1c9be6a5b2d068d552dc36262a21b0fcc55e066f6cd031ee9d96fd11f986d3eecc0333
-
Filesize
14KB
MD5c7ae6920c53a0faee45b0a1933b98fcf
SHA12c29a4ac3240cd739ae389eeef71aab2ffeb38d4
SHA2566cea9f0d358170604465b61db51858ef3aabb8ad1f06da0e772e3393c106808f
SHA512b083f6ef0705246bb7ee9f3a598dfd547ecd9dbbcfd537a42fc4315db78cec2b0a4469777f70531bd4ad086796bad2edbb8a9c6fb7bd39ca893f2f29f900d6e9
-
Filesize
14KB
MD5cc2c1e63442087601d19834b6d8e85c1
SHA1978a0e013a3f63a6a9db29922f3bd96f95e820d7
SHA25644edc6e2e47d0540c9ac1f037e87deab637f7dc71dd11f60744fd64f76851fd9
SHA512041abc2d325f6b3f412b8b5d05792c375d7a0aa89a2d7066544f2cf298554bc3664f2c98dbaa9234420ee396e428c0c699295a1ff6db2b973db1f942b52e47c0