Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
509dec72f451476fdf76b890d8e13230N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
509dec72f451476fdf76b890d8e13230N.exe
Resource
win10v2004-20240709-en
General
-
Target
509dec72f451476fdf76b890d8e13230N.exe
-
Size
27KB
-
MD5
509dec72f451476fdf76b890d8e13230
-
SHA1
afaadabc9861b28484e56a1eaf37f6d08d59ce9a
-
SHA256
36655d133e4da5fc390fd3f3b131b4cdd393061a1c43e18bf29bf79e3d5c3a27
-
SHA512
9604a30c6ef644222887889b086c5bcef6bd10da560683d5d0659030259fc3130d1ab83320a3c47944c47a53edd4407d5ec27db02a613abc94bd8341b89e00e1
-
SSDEEP
768:TmvHfYggggggLvggggggggUaocNoknjjv:TsIoIbnH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 509dec72f451476fdf76b890d8e13230N.exe -
Executes dropped EXE 1 IoCs
pid Process 3520 btkba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 509dec72f451476fdf76b890d8e13230N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btkba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 612 wrote to memory of 3520 612 509dec72f451476fdf76b890d8e13230N.exe 85 PID 612 wrote to memory of 3520 612 509dec72f451476fdf76b890d8e13230N.exe 85 PID 612 wrote to memory of 3520 612 509dec72f451476fdf76b890d8e13230N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\509dec72f451476fdf76b890d8e13230N.exe"C:\Users\Admin\AppData\Local\Temp\509dec72f451476fdf76b890d8e13230N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\btkba.exe"C:\Users\Admin\AppData\Local\Temp\btkba.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD513d4c996359b1ddd84234fc7880d7b31
SHA1738028a7df10b9f8edf3d3a5ed347a20d233e35d
SHA256c7fd31f86016240f9018a0c595ecf39abe1158427bfb6232126b0c26a33cd0ba
SHA512979bfcc70c5156822ded487344b2839ddcd353b0e47e845e5396f6f0d5f26f263509031c03c8bc6b670836b553aaad59821688763e8a2ae95ec0b83e387af36c