Analysis
-
max time kernel
103s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 10:01
Behavioral task
behavioral1
Sample
bd7f21a62bf8e280aa35af88f8c62c20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd7f21a62bf8e280aa35af88f8c62c20N.exe
Resource
win10v2004-20240709-en
General
-
Target
bd7f21a62bf8e280aa35af88f8c62c20N.exe
-
Size
111KB
-
MD5
bd7f21a62bf8e280aa35af88f8c62c20
-
SHA1
b8835f327eb8fbbcb4015b62162b7ac3c386956c
-
SHA256
857de405df42c47dc13015d8804ffc4c60db8068388c616d8997e5428fe6aad0
-
SHA512
20667a8c0b8e993cadaf9624da637bf10e9bc70c40692273b070b1971372fa6d20a7c9648d7b57e3a995a9b13492a7e7db3788d71286241ac8fb4708d336a398
-
SSDEEP
1536:ELNIW39SaZTbFARlq7jC1OZstZu0TSVEdUJWTWd18f9:ELlbZTZX3BAtTSVEdUJWTWd18f9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation bd7f21a62bf8e280aa35af88f8c62c20N.exe -
Executes dropped EXE 1 IoCs
pid Process 212 guifx.exe -
resource yara_rule behavioral2/memory/2640-0-0x0000000000690000-0x00000000006AC000-memory.dmp upx behavioral2/files/0x0008000000023462-3.dat upx behavioral2/memory/212-5-0x0000000000C90000-0x0000000000CAC000-memory.dmp upx behavioral2/memory/2640-6-0x0000000000690000-0x00000000006AC000-memory.dmp upx behavioral2/memory/212-7-0x0000000000C90000-0x0000000000CAC000-memory.dmp upx behavioral2/memory/2640-8-0x0000000000690000-0x00000000006AC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graphics = "\"C:\\ProgramData\\Graphics\\guifx.exe\" /run" bd7f21a62bf8e280aa35af88f8c62c20N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd7f21a62bf8e280aa35af88f8c62c20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guifx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2640 wrote to memory of 212 2640 bd7f21a62bf8e280aa35af88f8c62c20N.exe 84 PID 2640 wrote to memory of 212 2640 bd7f21a62bf8e280aa35af88f8c62c20N.exe 84 PID 2640 wrote to memory of 212 2640 bd7f21a62bf8e280aa35af88f8c62c20N.exe 84 PID 2640 wrote to memory of 552 2640 bd7f21a62bf8e280aa35af88f8c62c20N.exe 97 PID 2640 wrote to memory of 552 2640 bd7f21a62bf8e280aa35af88f8c62c20N.exe 97 PID 2640 wrote to memory of 552 2640 bd7f21a62bf8e280aa35af88f8c62c20N.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd7f21a62bf8e280aa35af88f8c62c20N.exe"C:\Users\Admin\AppData\Local\Temp\bd7f21a62bf8e280aa35af88f8c62c20N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\ProgramData\Graphics\guifx.exe"C:\ProgramData\Graphics\guifx.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:212
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\bd7f21a62bf8e280aa35af88f8c62c20N.exe" >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD572f39f5727eb607ee57a5055d6757d63
SHA11fd461bd71f67bb5645932a087b06679ab8cdbb9
SHA2567556194677de973290c0ea2f2d10f6268baf390b348d29c8faf6af3953603762
SHA5124aceee8af3fd99ce99d5e35e2385261650b7305ac5bbc4be35087e13ed3f71c1029c9abd8831bb171ac670cffc8599e9dc624d8836555b80c47ed9052e79554f