Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 07:37
Behavioral task
behavioral1
Sample
a934df4f5b2760aec8fd9a830f04ca40N.exe
Resource
win7-20240704-en
General
-
Target
a934df4f5b2760aec8fd9a830f04ca40N.exe
-
Size
51KB
-
MD5
a934df4f5b2760aec8fd9a830f04ca40
-
SHA1
59cacd924ee694d146cf0bd62ea08e5109f5c1ec
-
SHA256
15368f5d2fdbd1324643ca21de570827aa27a9c730d27a74a5fe1dae29e90180
-
SHA512
2a39e38744eade51477c96fb16ec959b3185bd0d8655dbf150c188fc657bc3933b6f34c9169f374d2703f4e0f0bf4cb5f7540cdf36b0fc7742a4a665b2d3ccf6
-
SSDEEP
768:exwhM/tqZKgVuz1NmnbcuyD7Uf54Ak12M5ezNG/2rb7vqV7Nd:exkAGnVE1Nmnouy8B4ZUGezN/jqVRd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation a934df4f5b2760aec8fd9a830f04ca40N.exe -
Executes dropped EXE 1 IoCs
pid Process 3188 wujek.exe -
resource yara_rule behavioral2/memory/208-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/files/0x0002000000022a92-6.dat upx behavioral2/memory/3188-10-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3188-11-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/208-12-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a934df4f5b2760aec8fd9a830f04ca40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wujek.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 208 wrote to memory of 3188 208 a934df4f5b2760aec8fd9a830f04ca40N.exe 87 PID 208 wrote to memory of 3188 208 a934df4f5b2760aec8fd9a830f04ca40N.exe 87 PID 208 wrote to memory of 3188 208 a934df4f5b2760aec8fd9a830f04ca40N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a934df4f5b2760aec8fd9a830f04ca40N.exe"C:\Users\Admin\AppData\Local\Temp\a934df4f5b2760aec8fd9a830f04ca40N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\wujek.exe"C:\Users\Admin\AppData\Local\Temp\wujek.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5cf09764c83bc6f044aa34f9cdecd5372
SHA1714a7cc15996388e788ef07cf0b73972b97d09ef
SHA256e52f81d99e14b399a684d3b96e7f1a955e58f74c0b944af598ae900d13caa9c1
SHA512c674359fedb77fd514e5d1afb5dc891f2b5320afd43e1635abee4406484e232da928b21d67bbdef5cdde5324cbe8449780b041760d5a4b60fee2ce70c269d58b