Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
0b5544cbf3ec43f21f7f55882806b850N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0b5544cbf3ec43f21f7f55882806b850N.exe
Resource
win10v2004-20240709-en
General
-
Target
0b5544cbf3ec43f21f7f55882806b850N.exe
-
Size
761KB
-
MD5
0b5544cbf3ec43f21f7f55882806b850
-
SHA1
ed59c785a96bf9f8dec81227e59d422ed94c0314
-
SHA256
1ba4002a9bf34dbecf87ac3b9c5d3420c8b55e09a842b00801440bae0a218a08
-
SHA512
f8c05f0c21d97cee2eea6c1bed64ed06271e86d399dd739a764e357fecac20d7b20fafe6271c31080bd8257478564ac90323809c754fe9c4f063d1178e4c75a5
-
SSDEEP
12288:w5hAPjVQDNwwkBr/kS6jtmw1Bp3FkKwE31iV74uDqXYDvL:wgq2wkp4BmuFKE1c4MnDv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 0b5544cbf3ec43f21f7f55882806b850N.exe -
Executes dropped EXE 2 IoCs
pid Process 4784 zikumiv.exe 940 ~DFA265.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 ~DFA265.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4784 1596 0b5544cbf3ec43f21f7f55882806b850N.exe 85 PID 1596 wrote to memory of 4784 1596 0b5544cbf3ec43f21f7f55882806b850N.exe 85 PID 1596 wrote to memory of 4784 1596 0b5544cbf3ec43f21f7f55882806b850N.exe 85 PID 4784 wrote to memory of 940 4784 zikumiv.exe 87 PID 4784 wrote to memory of 940 4784 zikumiv.exe 87 PID 4784 wrote to memory of 940 4784 zikumiv.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b5544cbf3ec43f21f7f55882806b850N.exe"C:\Users\Admin\AppData\Local\Temp\0b5544cbf3ec43f21f7f55882806b850N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\zikumiv.exeC:\Users\Admin\AppData\Local\Temp\zikumiv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\~DFA265.tmpC:\Users\Admin\AppData\Local\Temp\~DFA265.tmp OK3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD56044746b66624b75768fef0ceab788ba
SHA14059039957b478b8e037dab2ddfdeb84235f0168
SHA2562c204347a93f5e349d018ae3374ae56d79413114541654240d52d2563e5e35fd
SHA512478b91b6cc77e579259eb049a7c2a5f8a610329bf231d350fdf3cbad3996ea26f5316e32c05e3fc0420859fa96de4d4995a386fad513c6a94bf82035f40a8ab3
-
Filesize
765KB
MD5336ec553202fe98366e2ecbf13e76383
SHA153f51961f0c25e24ace2572b8cb5513eded16e43
SHA25640fabb07ba002ca0f4ce467f2d00b8ee1c3af4e0c95862852b1b24f10436fbcb
SHA5127a184abdfb51f80d82b1902a5a674bbfd79a2cdec243fb389705caf5feac283798353a81a7c7ea45093c9e73ecf12bbefd29c06402e0c9e30fa1c77a6c03514b
-
Filesize
768KB
MD51d3378136fe1b1bcbe7376da9d13e906
SHA10208ddbc8404e5be81cfbd42c841262e58a30ab3
SHA256def1bb9f956c2b07bfe4c5323c357045c8920407c47f25166569a5bc0a1d10ae
SHA5124c20f1ea59b48e088446b43f2e50559a9f0ea45023f3465a29f8d0dd278d8571f9ff29f6e5a05b22d6f0260f53bc75fc8338a1cb03795ec99c571988a2826042