Analysis
-
max time kernel
112s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
15caf78d05a0fa57a2437e1c8526ae30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
15caf78d05a0fa57a2437e1c8526ae30N.exe
Resource
win10v2004-20240709-en
General
-
Target
15caf78d05a0fa57a2437e1c8526ae30N.exe
-
Size
279KB
-
MD5
15caf78d05a0fa57a2437e1c8526ae30
-
SHA1
960ff36adc0b2d1f0b58e2158b796a5f9ed7970f
-
SHA256
ce40345a7a091ce1d7cfb88e8d757b80148e29265b43f2dcd7c283767243a783
-
SHA512
42c0c706cd97affe215f11b222bae24a7d491813605bd8722396deced7817799f1d7d4beea30f0e07dfbbaf6efff1fe8099359c5e08ee4a3b6483f9694b5ac2d
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fK7:boSeGUA5YZazpXUmZhZ6S7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 15caf78d05a0fa57a2437e1c8526ae30N.exe -
Executes dropped EXE 1 IoCs
pid Process 3932 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 15caf78d05a0fa57a2437e1c8526ae30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4576 wrote to memory of 3932 4576 15caf78d05a0fa57a2437e1c8526ae30N.exe 93 PID 4576 wrote to memory of 3932 4576 15caf78d05a0fa57a2437e1c8526ae30N.exe 93 PID 4576 wrote to memory of 3932 4576 15caf78d05a0fa57a2437e1c8526ae30N.exe 93 PID 3932 wrote to memory of 452 3932 a1punf5t2of.exe 95 PID 3932 wrote to memory of 452 3932 a1punf5t2of.exe 95 PID 3932 wrote to memory of 452 3932 a1punf5t2of.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\15caf78d05a0fa57a2437e1c8526ae30N.exe"C:\Users\Admin\AppData\Local\Temp\15caf78d05a0fa57a2437e1c8526ae30N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD52fb9020299503da45ea5ef53618ab263
SHA164b8dc775bd6657cd37ad48dfe5d1d78af0cfaf3
SHA256ba6c74dd2e6540fd96f4b0b395255552bc7e6dbb25dd810bff7faf2319a7453f
SHA512b21f2296e190441391190b77b7226663bbb7df44861b3739d2edee05c8208f9c974cef17b5b3c0d450b2e5f899187e2379a6196e91bde8cbf7dddac68e23d0bc