Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 07:42
Behavioral task
behavioral1
Sample
8b539a06f73be7631c06097dd2537e00N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b539a06f73be7631c06097dd2537e00N.exe
Resource
win10v2004-20240730-en
General
-
Target
8b539a06f73be7631c06097dd2537e00N.exe
-
Size
154KB
-
MD5
8b539a06f73be7631c06097dd2537e00
-
SHA1
465f3410bf356c5d1cacc35137722a2096e2a4a3
-
SHA256
6edf4b4fd4c9444373d4cc6a9d1022a174c7088361c7212d5e7877eb030d150c
-
SHA512
9223f280ef96221a827bad46c882d2c64db08aed65c1c8426988948119cba803730f7936548768c7d030e3579f04057a6e2a7a319b24e2967d3a6d28b3c901c8
-
SSDEEP
3072:Ntbqvi9nMKxQbZ5x66EfACsxfcYvQd2Oew:Nt2vsx+AV4LfLOD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8b539a06f73be7631c06097dd2537e00N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1266786182-1874524688-71015548-1000\Control Panel\International\Geo\Nation 8b539a06f73be7631c06097dd2537e00N.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 3268 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
biudfw.execmd.exe8b539a06f73be7631c06097dd2537e00N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b539a06f73be7631c06097dd2537e00N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8b539a06f73be7631c06097dd2537e00N.exedescription pid process target process PID 3712 wrote to memory of 3268 3712 8b539a06f73be7631c06097dd2537e00N.exe biudfw.exe PID 3712 wrote to memory of 3268 3712 8b539a06f73be7631c06097dd2537e00N.exe biudfw.exe PID 3712 wrote to memory of 3268 3712 8b539a06f73be7631c06097dd2537e00N.exe biudfw.exe PID 3712 wrote to memory of 4512 3712 8b539a06f73be7631c06097dd2537e00N.exe cmd.exe PID 3712 wrote to memory of 4512 3712 8b539a06f73be7631c06097dd2537e00N.exe cmd.exe PID 3712 wrote to memory of 4512 3712 8b539a06f73be7631c06097dd2537e00N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b539a06f73be7631c06097dd2537e00N.exe"C:\Users\Admin\AppData\Local\Temp\8b539a06f73be7631c06097dd2537e00N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5168eb6fbac21f9ee4c6c8bdffb92b0c9
SHA1a8ae033932a7e85d4921e01345796dc1eb441fa7
SHA2563a76d440cb8a2e4ac952ce3c38016bb74d5d4cdbf06e4bb5ef70ff1267839ca6
SHA512c20ad48fa8bbd8043126c6580e34cdfd7cf5948c969de1debd101b7ab73d33d6605d611ef83989f3791ad4d4f339c6b5675c1f530feca6b8f83063df76cb62bc
-
Filesize
512B
MD52930c042c9ee5e07f321f2134a0c7edc
SHA1ee39f41eaf6ce3c8d917a89e65959414ae0088e6
SHA256a328475bbb730da292b83ed6cabbdbfc0616f042296f0c6fa356c5368ffc1309
SHA5122da91d5effc116d8c8661c2a99f1d9c2aaffda0f776551dc7ad1911fdb2765591e5b441b9a1fe0090bcda8ed24d180b563ed2c127676cf1de40001e4b15b5506
-
Filesize
276B
MD531429775ef6629e8cfb9db58991f6b72
SHA1ab996535ed2155db6bb71fe93aa58f2b97517117
SHA25644e501989e3e5bd3c85d7fd4dad7cb4c5f2110bf1986084b1251124ad03884f7
SHA5128174bbbee728ac71f41b6a1fc24b9ad53b4444f5ca64652672d35a14e80f1bc0c8ea3c8ee64385d1c76063a11a4a53c8acdbbcf9b82abe4a155cce68556f16c7