Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe
Resource
win10v2004-20240508-en
General
-
Target
4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe
-
Size
5.5MB
-
MD5
0c6ec40e822d786d0b266fa0f90bd6f5
-
SHA1
56be16b60f8e8608cb7304a6b6b690d9ab7137f5
-
SHA256
4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6
-
SHA512
159acd9e1213cfb0ce3c80a69e83becb834f1a61b9b968f103d2f874e89a159a0bdf1f14801eb3dfb31c419cbf9d2d73426ab29907d8217bde65d283c53372f4
-
SSDEEP
98304:A0SPgW5G6uUIQBbrXyHA2r25KOKLT1k6JqHS/RY0drKCX8vF9fNS:tW+kiHpr2ILJk6JMMRj+d9S
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 hots.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2296 4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe 2296 4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe 1148 hots.exe 1148 hots.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1148 2296 4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe 81 PID 2296 wrote to memory of 1148 2296 4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe 81 PID 2296 wrote to memory of 1148 2296 4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe"C:\Users\Admin\AppData\Local\Temp\4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\hots.exe"C:\Users\Admin\AppData\Local\Temp\hots.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD509e1eb361ea43d9af6134bd70dad526d
SHA181d9c9bde14df46c68dbb08bdf89d69f09150e05
SHA2560e776fc774edd3f89c4102e8f2b7b59daf76c827738aa721f459169b58aad813
SHA5125b9caa2d9ac5df7d80b027fa17d8cb1fde5e7bc255310e7b8eb93ef3ddbcfebeb3d43d5a211deeb8004b11b3cb37972354816c9b63860480b3184fbf866a3ab0