Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe
Resource
win10v2004-20240709-en
General
-
Target
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe
-
Size
5.6MB
-
MD5
753df56b82850430b8c7e25aaa93ea66
-
SHA1
5977fa278c4ab6f2e515efe72f09c85e67ff0590
-
SHA256
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2
-
SHA512
8e25374af7d513be5b2f6700dc4d07fdeea75e2fc56b32cd0ea6c5117334a02ede3cace39836df64680da92d5231d08c2f08798e9a27f2315496beda37710ac3
-
SSDEEP
98304:Qdv4xixurOYvLtWV9SxAPZl+RqgSRe4rcSRhE1RKsJgHXe8iDuLNuTTz:24QsrvvySshgSsR/mOJANi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4532 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 1796 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1692 1796 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 92 PID 1796 wrote to memory of 1692 1796 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 92 PID 1796 wrote to memory of 1692 1796 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 92 PID 1692 wrote to memory of 4532 1692 cmd.exe 94 PID 1692 wrote to memory of 4532 1692 cmd.exe 94 PID 1692 wrote to memory of 4532 1692 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe"C:\Users\Admin\AppData\Local\Temp\25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 10 & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4532
-
-