Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
533966f4f2fc56d3b019d71a8aca88c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
533966f4f2fc56d3b019d71a8aca88c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
533966f4f2fc56d3b019d71a8aca88c0N.exe
-
Size
51KB
-
MD5
533966f4f2fc56d3b019d71a8aca88c0
-
SHA1
2210b216c1cea895740a64942f2003b0ae80d60c
-
SHA256
32eb7c89de5e637542cd86b878c494014fc4961ef749c7831acccd7ba2102552
-
SHA512
ea8ecbf3ae4ade899932177e25174d250d4819314b1af941dd75a551ae38fecd1f8e7855a5212dcd84ca28f5cb43434c8d53d6cb687d882e8f6078567913476d
-
SSDEEP
384:EqXJhMCEfgNfxAwMRGnkXF2MTNeUGpPdMYbsd/PwIsyUbSZBAPn+zNY8yrva92zg:EsJhM/44Ak12M5ezNG/2rb7+ZY/vAeM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 533966f4f2fc56d3b019d71a8aca88c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 wujek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 5116 4644 533966f4f2fc56d3b019d71a8aca88c0N.exe 85 PID 4644 wrote to memory of 5116 4644 533966f4f2fc56d3b019d71a8aca88c0N.exe 85 PID 4644 wrote to memory of 5116 4644 533966f4f2fc56d3b019d71a8aca88c0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\533966f4f2fc56d3b019d71a8aca88c0N.exe"C:\Users\Admin\AppData\Local\Temp\533966f4f2fc56d3b019d71a8aca88c0N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\wujek.exe"C:\Users\Admin\AppData\Local\Temp\wujek.exe"2⤵
- Executes dropped EXE
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD596383c8dd792a9df1cd8a1bf7e5bb4e1
SHA1820f2e703327e4e23bbac0ba982f2da62870fc7f
SHA256847ff31a837b2335dcc0fa3595bf9c60d09661daa98252d1c2bfa263ee3c8322
SHA512c31e954637897943efdf4b1977136218f8f52e7ef10e3502c2c9574c49fa4ae93db1d9d07dd44e97c52ac8e9996d491a7376211cf2be2ba09bc445b510279517