Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
BRUTOFORCE-SEED-V12.6.8/BRUTOFORCE SEED V12.6.8.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
BRUTOFORCE-SEED-V12.6.8/data32.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
BRUTOFORCE-SEED-V12.6.8/drivefsext.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
BRUTOFORCE-SEED-V12.6.8/lib.exe
Resource
win10v2004-20240709-en
General
-
Target
BRUTOFORCE-SEED-V12.6.8/lib.exe
-
Size
64.4MB
-
MD5
f4db0c6f4eac031121dfc08675c84e7c
-
SHA1
e419149294889f087d7b3122f484a7453fc23210
-
SHA256
cfcd1ec2315a49c410bcef131cc4d1e7674364c34a20902fed43e20d053978e0
-
SHA512
40d159283f5176ce42680309948be2127740ddf8078b1bb81dc69ff9672553158f186fd9a55cfb1348bb5ff118c38d1cb52c9fd4b5218672808773e0b164d9cc
-
SSDEEP
1572864:tCEnmOy4v0SH7+m38eUSgCX0CQ3+VXaw4hCnPHK:bmOKrSDX0V+VTPq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation lib.exe -
Executes dropped EXE 1 IoCs
pid Process 4692 BRUTOFORCE SEED.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BRUTOFORCE SEED.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1864 wrote to memory of 4692 1864 lib.exe 89 PID 1864 wrote to memory of 4692 1864 lib.exe 89 PID 1864 wrote to memory of 4692 1864 lib.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\BRUTOFORCE-SEED-V12.6.8\lib.exe"C:\Users\Admin\AppData\Local\Temp\BRUTOFORCE-SEED-V12.6.8\lib.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\BRUTOFORCE SEED.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\BRUTOFORCE SEED.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4692
-