Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
dccb001a19c8052eb09d3bd979178a50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dccb001a19c8052eb09d3bd979178a50N.exe
Resource
win10v2004-20240709-en
General
-
Target
dccb001a19c8052eb09d3bd979178a50N.exe
-
Size
25KB
-
MD5
dccb001a19c8052eb09d3bd979178a50
-
SHA1
6c10b8e56b3d1b21cbf313af013c69f687bc6cfc
-
SHA256
51d37ec27d9baacd82e1e712ba065cd5494ee73fb16c6dc444257f067c50f515
-
SHA512
80d1c142d9f24b543d610b659002dc55094875f4437a732f1139b22f7dd81ebed8a6593cf2c7a86e543e41876d239111625e16384b333b0ece542157e5bea4d2
-
SSDEEP
384:W6C5SYpuESCgvATWe64rbd8wdpczpu2aoDmVaN:W6n0Sa+Izpcai
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation dccb001a19c8052eb09d3bd979178a50N.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation ffengh.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 ffengh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2340 4940 dccb001a19c8052eb09d3bd979178a50N.exe 85 PID 4940 wrote to memory of 2340 4940 dccb001a19c8052eb09d3bd979178a50N.exe 85 PID 4940 wrote to memory of 2340 4940 dccb001a19c8052eb09d3bd979178a50N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\dccb001a19c8052eb09d3bd979178a50N.exe"C:\Users\Admin\AppData\Local\Temp\dccb001a19c8052eb09d3bd979178a50N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\ffengh.exe"C:\Users\Admin\AppData\Local\Temp\ffengh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5099c6f6bd1485c4b7bdd0fee1eb39e8a
SHA17eb8da2989b76618c266a8c79d94311900c66c12
SHA2561318f427eed0337a19f31c2f770f11c175825d9680a663b77cb5a64381245e05
SHA5127d06f39c1553b5a0a8a4dc0933d471d7e4ee3a64fa80d47915fda345b667b56501ec1de72ffa0f6eeddb50ac7f9d0d7b3e3febe732958d8a7a7ce04e0b96c189