Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 00:09
Behavioral task
behavioral1
Sample
3914de8aa3ecf3b70f7771655b620180N.exe
Resource
win7-20240705-en
General
-
Target
3914de8aa3ecf3b70f7771655b620180N.exe
-
Size
44KB
-
MD5
3914de8aa3ecf3b70f7771655b620180
-
SHA1
948c7684983bac80a39b9557dd48d89fb9b6e843
-
SHA256
27c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14
-
SHA512
e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e
-
SSDEEP
768:kKpu9Tv4A4QfJkwINr8I0SeM5MbRFywB/ZXD5DtZ9bEUWAfAFkY:hc9z4rQfwNr8QeM2biwBx5Dz9bEpAfol
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 3914de8aa3ecf3b70f7771655b620180N.exe -
Executes dropped EXE 1 IoCs
pid Process 4320 3914de8aa3ecf3b70f7771655b620180N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3914de8aa3ecf3b70f7771655b620180N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3914de8aa3ecf3b70f7771655b620180N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1240 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4320 4424 3914de8aa3ecf3b70f7771655b620180N.exe 85 PID 4424 wrote to memory of 4320 4424 3914de8aa3ecf3b70f7771655b620180N.exe 85 PID 4424 wrote to memory of 4320 4424 3914de8aa3ecf3b70f7771655b620180N.exe 85 PID 4320 wrote to memory of 1240 4320 3914de8aa3ecf3b70f7771655b620180N.exe 93 PID 4320 wrote to memory of 1240 4320 3914de8aa3ecf3b70f7771655b620180N.exe 93 PID 4320 wrote to memory of 1240 4320 3914de8aa3ecf3b70f7771655b620180N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3914de8aa3ecf3b70f7771655b620180N.exe"C:\Users\Admin\AppData\Local\Temp\3914de8aa3ecf3b70f7771655b620180N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\XenoManager\3914de8aa3ecf3b70f7771655b620180N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\3914de8aa3ecf3b70f7771655b620180N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Microsoft office service" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAA0B.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3914de8aa3ecf3b70f7771655b620180N.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5151f4113cb414cb5615256275ba68713
SHA1af54a1512e1c0113d58745d1856a0393f43c4f07
SHA2568865880884854847741f2aa22368f590a96cbc6cf65bf04e7458c66d7e284f98
SHA5129272200b8b09271a82a476acbb2cc50b030dd001de97c7a562efb12279d65bf774f780536d09a89671909678c912f6a28e9360368f9d3b3af55ca97ed45183c2
-
Filesize
44KB
MD53914de8aa3ecf3b70f7771655b620180
SHA1948c7684983bac80a39b9557dd48d89fb9b6e843
SHA25627c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14
SHA512e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e