Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe
Resource
win10v2004-20240709-en
General
-
Target
5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe
-
Size
85KB
-
MD5
5eaaa92e0c4d1ffe9eec77c7fff70ec0
-
SHA1
437ba7c12fa520f6eb66d5f68a0e466a1e1fb48e
-
SHA256
492549d4a05cd4951eb6bce341ce8a8bd9a9c031e65e175b8a92b4dd65f7c7c6
-
SHA512
0f4ffb133c25f2d070b3ceb601d28f5d6aad89b827e6f311f4e53446c25abb8c14b02c7a3969a507d45131c9d6b0ea0558da842e4b481bbf34d5a8226162b8fe
-
SSDEEP
1536:IGsBuoFn7UZ+LtdgI2MyzNORQtOflIwoHNV2XBFV72B4lA7ZsbI8zYeDds:IGjot7UQLtdgI2MyzNORQtOflIwoHNVv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4712 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgfdfjdk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4712 1224 5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe 84 PID 1224 wrote to memory of 4712 1224 5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe 84 PID 1224 wrote to memory of 4712 1224 5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe"C:\Users\Admin\AppData\Local\Temp\5eaaa92e0c4d1ffe9eec77c7fff70ec0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD51d5ad2555de28c7dbbdc7f9b42267eb4
SHA121007313caae1767ec007d4ff5400917a0b09077
SHA2561170fe7731d9f6983c2b0f34f5a425a49e56ec40db451a5c2f46445645e88c85
SHA512a49de060a8d8ad451cde32f5b825a7dbd7ab3b7f304a8af2ea5731903cb4f0f7ff3a130ba887918fca9a0fb181d12d055f3b2e0cd8ad9840bfb4300711ca1520