Analysis
-
max time kernel
91s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
4c4f953f327d31b3721f6aa59f37dcb0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c4f953f327d31b3721f6aa59f37dcb0.exe
Resource
win10v2004-20240704-en
General
-
Target
4c4f953f327d31b3721f6aa59f37dcb0.exe
-
Size
37KB
-
MD5
4c4f953f327d31b3721f6aa59f37dcb0
-
SHA1
8fe069e304ac99ce01c93bd6a29b8a2c2104d1af
-
SHA256
111c1015c52277b07d78f67a53131c5f4419747a1d92146755a93ac643be5911
-
SHA512
d568209b0775023fe62fe44a3d082f430377bfc62c87f9fdf43c70cea1ea278336b34f72eeab0b1b6ce11200be55558f8fd0f7f44cd6e72e44470e8d08da0aed
-
SSDEEP
768:/YzEI7aYv6N3a5smptK5VX1/fAg8p/t/ctpiaC0ZrG7/:jcaYvEa5Ltaneht/c7vCKrw/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation 4c4f953f327d31b3721f6aa59f37dcb0.exe -
Executes dropped EXE 1 IoCs
pid Process 4588 ymjrx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1116 wrote to memory of 4588 1116 4c4f953f327d31b3721f6aa59f37dcb0.exe 84 PID 1116 wrote to memory of 4588 1116 4c4f953f327d31b3721f6aa59f37dcb0.exe 84 PID 1116 wrote to memory of 4588 1116 4c4f953f327d31b3721f6aa59f37dcb0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c4f953f327d31b3721f6aa59f37dcb0.exe"C:\Users\Admin\AppData\Local\Temp\4c4f953f327d31b3721f6aa59f37dcb0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\ymjrx.exe"C:\Users\Admin\AppData\Local\Temp\ymjrx.exe"2⤵
- Executes dropped EXE
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ec44e68f9fb74fea77519e1cf0c70e29
SHA14d501a83144478eafbcf5d28db2c40277507c943
SHA25605d0f824dad1a120e22c4217ce2e136ecf293ea4a2a91de15b53b401a99563ef
SHA5126705da1c0bdfc20f81174abdb80bf5967549269b123f74eccfbe2f9b75155f823bfdd8219c7d1e37ae19f9c494daa09cffd41c2026699d78eb8660971b3ad2bf