Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
63e4859729fa0659f775d70265582b00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63e4859729fa0659f775d70265582b00N.exe
Resource
win10v2004-20240709-en
General
-
Target
63e4859729fa0659f775d70265582b00N.exe
-
Size
85KB
-
MD5
63e4859729fa0659f775d70265582b00
-
SHA1
602d1275f023b69df5feae4db5889230b7e7e609
-
SHA256
765a91107c1d409f7303b98523f74c7d7477ec64da0a34ce6ad6b36bcb9754a1
-
SHA512
301a80a03ad599228764194a665faa6e1d9ef99408c01b3a7628bab5f24588a716fc4281d9d10a99df5508ccd9a0ad353f84f74faff3838c6c7de2f793b1186a
-
SSDEEP
1536:IGsBuoFn7UZ+LtdgI2MyzNORQtOflIwoHNV2XBFV72B4lA7ZsbI8zYeDdt:IGjot7UQLtdgI2MyzNORQtOflIwoHNV6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 63e4859729fa0659f775d70265582b00N.exe -
Executes dropped EXE 1 IoCs
pid Process 4872 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3512 wrote to memory of 4872 3512 63e4859729fa0659f775d70265582b00N.exe 84 PID 3512 wrote to memory of 4872 3512 63e4859729fa0659f775d70265582b00N.exe 84 PID 3512 wrote to memory of 4872 3512 63e4859729fa0659f775d70265582b00N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\63e4859729fa0659f775d70265582b00N.exe"C:\Users\Admin\AppData\Local\Temp\63e4859729fa0659f775d70265582b00N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Executes dropped EXE
PID:4872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5f7489eb217b7b388f74773015621ea58
SHA1bd271c19f6a1cde4f3d008bb74d2b00547cd7f92
SHA256864e8f4b5310659276542220635abcfad835a0fc750c8f70f041ef56b65a6e4b
SHA51258c3803807a53254423b8c19ff51eafdde4333d57f4b293ba6fab0c6e4c9c2ba9c20dae7789d8dcba76851b8ff767fd7e80927801f953e475132c1f8f1f091f3