Analysis
-
max time kernel
95s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
95d595d85a304ba222698d72a3865050N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95d595d85a304ba222698d72a3865050N.exe
Resource
win10v2004-20240709-en
General
-
Target
95d595d85a304ba222698d72a3865050N.exe
-
Size
45KB
-
MD5
95d595d85a304ba222698d72a3865050
-
SHA1
1326bf4ec1450817443c45853a2ef9aa65c8b263
-
SHA256
be92f101422bcc55019670544cc3d4566dfbba135de21be2b1889919f4f8a4c2
-
SHA512
45cb09fccde450904b017332a725caff197b1da684e020b860c49ba695175fe4612551a5541267da9ae6b50683c020d1601ab2c847c94738384979b6d0df1ef2
-
SSDEEP
768:CnnOWEvtPvkFk58sCu84euZR5FbrGePc/3FttKAeiX+:CnOtvtPf58k8GtBSXtKAL+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 95d595d85a304ba222698d72a3865050N.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 pdflauncher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 240 wrote to memory of 2256 240 95d595d85a304ba222698d72a3865050N.exe 85 PID 240 wrote to memory of 2256 240 95d595d85a304ba222698d72a3865050N.exe 85 PID 240 wrote to memory of 2256 240 95d595d85a304ba222698d72a3865050N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d595d85a304ba222698d72a3865050N.exe"C:\Users\Admin\AppData\Local\Temp\95d595d85a304ba222698d72a3865050N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\pdflauncher.exe"C:\Users\Admin\AppData\Local\Temp\pdflauncher.exe"2⤵
- Executes dropped EXE
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5204e56ca02a96f6b4b44cadd39929ef7
SHA1758c436f192ddf218d4c590345b44eb45be280ef
SHA256c3de7a3608f85dd4d3992fef0868d02fc61df1759b5715de36008f1315b817d3
SHA512b2aeb33551d810321efddfd3e265c3817dabadfeca7314126b79236894670b6d226177cb112824b082b6b988d4b2be7ca2acbf3c70cd4ee1a77953f17fae5d84