Analysis
-
max time kernel
112s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
4cbc951c97990b3d13cac642efcf4660N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4cbc951c97990b3d13cac642efcf4660N.exe
Resource
win10v2004-20240709-en
General
-
Target
4cbc951c97990b3d13cac642efcf4660N.exe
-
Size
32KB
-
MD5
4cbc951c97990b3d13cac642efcf4660
-
SHA1
e4d0f638d9167c1ac920b286cb2edeeeef00cde5
-
SHA256
f8fa73d2032e1df64a5b9a4b9d8aff219f7bee604e22e3687b9c77b128c53c3f
-
SHA512
1517fa4c877a4d77e701ac80276b2ad0063be95ee5cd5e2efdae78eea6b40c7aab645394d7047f007278c9a93746c2cd3d2bc9865d103a1fdeac5a25cb5a4a0a
-
SSDEEP
768:nQv/YOZIgQtz8GEkT9oe2lxUCuY9m9e9tdEI2MyzNORQtOflIwoHNM2XBFV7WB7f:Qv/pZIgQtz8GEkT9oe2lxUCHCetdEI2A
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 4cbc951c97990b3d13cac642efcf4660N.exe -
Executes dropped EXE 1 IoCs
pid Process 4792 hromi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 800 wrote to memory of 4792 800 4cbc951c97990b3d13cac642efcf4660N.exe 86 PID 800 wrote to memory of 4792 800 4cbc951c97990b3d13cac642efcf4660N.exe 86 PID 800 wrote to memory of 4792 800 4cbc951c97990b3d13cac642efcf4660N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cbc951c97990b3d13cac642efcf4660N.exe"C:\Users\Admin\AppData\Local\Temp\4cbc951c97990b3d13cac642efcf4660N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\hromi.exe"C:\Users\Admin\AppData\Local\Temp\hromi.exe"2⤵
- Executes dropped EXE
PID:4792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5e72a0ddbc20f1a10c921e52b3b735084
SHA10025741d8b3f9a934433bc6705b79d01af2dbf38
SHA256620f88634ea5221c73a17fdc556935bc19fc820ef3df98ab2ac5c6710245fb27
SHA512eddc43deb1219f7df47c25c2b7a040dbf14c02cda8d856675ad34716c4512f473a7850e5c1d428b131bb41dfa0eea418fe437f87033618650a0e736d181fc9c8