Analysis
-
max time kernel
100s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
41824b1e1465f45f5eb2c16a6760f150N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
41824b1e1465f45f5eb2c16a6760f150N.exe
Resource
win10v2004-20240709-en
General
-
Target
41824b1e1465f45f5eb2c16a6760f150N.exe
-
Size
78KB
-
MD5
41824b1e1465f45f5eb2c16a6760f150
-
SHA1
82e48c5c8d2bae0a598881f162bdb2125ea31bf0
-
SHA256
9b3adb5c044016825d5bfcb1c4a135faf7605e6af5bbead555634950b5cd03b6
-
SHA512
e80394a4b84872edde5c0696cb47c3b7e2e5e8a13ecd43d69561da0b33f3167b584230c8c7b52a94d17548443ff502e7dc1062e89cda11238df193bc8bf7a6f4
-
SSDEEP
1536:nLNIW39SaZTbFARlq7jC1OZstZu0TS3gEdUJCkb0FGR:nLlbZTZX3BAtTS3gEdUJCkb0FGR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 41824b1e1465f45f5eb2c16a6760f150N.exe -
Executes dropped EXE 1 IoCs
pid Process 4196 guifx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graphics = "\"C:\\ProgramData\\Graphics\\guifx.exe\" /run" 41824b1e1465f45f5eb2c16a6760f150N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41824b1e1465f45f5eb2c16a6760f150N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guifx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3556 wrote to memory of 4196 3556 41824b1e1465f45f5eb2c16a6760f150N.exe 84 PID 3556 wrote to memory of 4196 3556 41824b1e1465f45f5eb2c16a6760f150N.exe 84 PID 3556 wrote to memory of 4196 3556 41824b1e1465f45f5eb2c16a6760f150N.exe 84 PID 3556 wrote to memory of 4176 3556 41824b1e1465f45f5eb2c16a6760f150N.exe 101 PID 3556 wrote to memory of 4176 3556 41824b1e1465f45f5eb2c16a6760f150N.exe 101 PID 3556 wrote to memory of 4176 3556 41824b1e1465f45f5eb2c16a6760f150N.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\41824b1e1465f45f5eb2c16a6760f150N.exe"C:\Users\Admin\AppData\Local\Temp\41824b1e1465f45f5eb2c16a6760f150N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\ProgramData\Graphics\guifx.exe"C:\ProgramData\Graphics\guifx.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\41824b1e1465f45f5eb2c16a6760f150N.exe" >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:4176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5d51a55e9ecb3ae512fd5512eb68467f7
SHA1c6289dcd62c26f08a53b0493314b912b4cd5cc9e
SHA2564aea7fd2e96d4fd6780cf741af7078ead871ff7200528f203875cc82e4e99e11
SHA5124e4b025a7e764e241434fed61ce41d5b85d0f46322d0812ae1a87475204088ce66cfd5cb0a48b5048ffacab92d4094f6faf7bc02aa50b2f5bf472e02874a5fd0