Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 00:19
Behavioral task
behavioral1
Sample
3914de8aa3ecf3b70f7771655b620180N.exe
Resource
win7-20240708-en
General
-
Target
3914de8aa3ecf3b70f7771655b620180N.exe
-
Size
44KB
-
MD5
3914de8aa3ecf3b70f7771655b620180
-
SHA1
948c7684983bac80a39b9557dd48d89fb9b6e843
-
SHA256
27c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14
-
SHA512
e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e
-
SSDEEP
768:kKpu9Tv4A4QfJkwINr8I0SeM5MbRFywB/ZXD5DtZ9bEUWAfAFkY:hc9z4rQfwNr8QeM2biwBx5Dz9bEpAfol
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 3914de8aa3ecf3b70f7771655b620180N.exe -
Executes dropped EXE 1 IoCs
pid Process 1560 3914de8aa3ecf3b70f7771655b620180N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3914de8aa3ecf3b70f7771655b620180N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3914de8aa3ecf3b70f7771655b620180N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1560 4332 3914de8aa3ecf3b70f7771655b620180N.exe 86 PID 4332 wrote to memory of 1560 4332 3914de8aa3ecf3b70f7771655b620180N.exe 86 PID 4332 wrote to memory of 1560 4332 3914de8aa3ecf3b70f7771655b620180N.exe 86 PID 1560 wrote to memory of 2016 1560 3914de8aa3ecf3b70f7771655b620180N.exe 92 PID 1560 wrote to memory of 2016 1560 3914de8aa3ecf3b70f7771655b620180N.exe 92 PID 1560 wrote to memory of 2016 1560 3914de8aa3ecf3b70f7771655b620180N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3914de8aa3ecf3b70f7771655b620180N.exe"C:\Users\Admin\AppData\Local\Temp\3914de8aa3ecf3b70f7771655b620180N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Roaming\XenoManager\3914de8aa3ecf3b70f7771655b620180N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\3914de8aa3ecf3b70f7771655b620180N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Microsoft office service" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC12D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5151f4113cb414cb5615256275ba68713
SHA1af54a1512e1c0113d58745d1856a0393f43c4f07
SHA2568865880884854847741f2aa22368f590a96cbc6cf65bf04e7458c66d7e284f98
SHA5129272200b8b09271a82a476acbb2cc50b030dd001de97c7a562efb12279d65bf774f780536d09a89671909678c912f6a28e9360368f9d3b3af55ca97ed45183c2
-
Filesize
44KB
MD53914de8aa3ecf3b70f7771655b620180
SHA1948c7684983bac80a39b9557dd48d89fb9b6e843
SHA25627c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14
SHA512e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e