Analysis
-
max time kernel
112s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
b03172ed02e4e61fb37e59919ecec560N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b03172ed02e4e61fb37e59919ecec560N.exe
Resource
win10v2004-20240704-en
General
-
Target
b03172ed02e4e61fb37e59919ecec560N.exe
-
Size
16KB
-
MD5
b03172ed02e4e61fb37e59919ecec560
-
SHA1
629f169a9ddc2d8269b26de0925be2771c5b1fae
-
SHA256
f9b69b75ce2edd9a2919959726c1975c7985e15f29f6ac72220dbafda2f5b972
-
SHA512
b179486c3643a91532afa91e1f9a7ed6d2b9f8816d51b7545089e78b09760bade16060a5f43688b2a59945a8f88d0c8db7de19bd06e74db8ddd95c2c9ddea859
-
SSDEEP
192:iG1iIwljCv8txM/IEmtS0o9vfYpywnL52SATIAt:iAwlGv8tO/I80oJfYp1nMSe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation b03172ed02e4e61fb37e59919ecec560N.exe -
Executes dropped EXE 1 IoCs
pid Process 4920 ieupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b03172ed02e4e61fb37e59919ecec560N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieupdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4920 1956 b03172ed02e4e61fb37e59919ecec560N.exe 85 PID 1956 wrote to memory of 4920 1956 b03172ed02e4e61fb37e59919ecec560N.exe 85 PID 1956 wrote to memory of 4920 1956 b03172ed02e4e61fb37e59919ecec560N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b03172ed02e4e61fb37e59919ecec560N.exe"C:\Users\Admin\AppData\Local\Temp\b03172ed02e4e61fb37e59919ecec560N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\ieupdate.exe"C:\Users\Admin\AppData\Local\Temp\ieupdate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD59b2007484fe57860117a81a17f898faf
SHA13201d47e634623fd40ddbaccfbb3baed7e0f2ee4
SHA2568e7ddba631bad408d8e068a6cd4f00e0426bbd5f5ec1c772cf7927f86c3331a0
SHA512f9aed7e4632c1c4562008f165e703f8ffedb4fe12114dec9bfe31128a0fc14d62d6ec0794cf51402714548d97124a994466101deda71dc2e57b815fdfc7f4d4e