Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
97a2a0d34d98578f31b2f529d896fec0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
97a2a0d34d98578f31b2f529d896fec0N.exe
Resource
win10v2004-20240802-en
General
-
Target
97a2a0d34d98578f31b2f529d896fec0N.exe
-
Size
113KB
-
MD5
97a2a0d34d98578f31b2f529d896fec0
-
SHA1
6f2659a77ecd1043accf12bf3115d9a709a53c8e
-
SHA256
b570f3cd5181aac092b7219bddfb8fa3e7b311b7df2aedcbb684d23c0b4d5670
-
SHA512
1a46cf362a2cccc66204f77e5d7c67b3bb566b072d5ef55200435d7f616b23f3eb143404fd264947151cd6a0f6bfbc5a49ef4e2a389b6064bc9869a99c2ce4ce
-
SSDEEP
384:OPP1svHMbR4PRdixlu09HNqmbYpjZHgzix0MFbJWC5sP6n:OPP1dbfbUgziPbh5sPm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 97a2a0d34d98578f31b2f529d896fec0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3192 senis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97a2a0d34d98578f31b2f529d896fec0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language senis.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3192 5112 97a2a0d34d98578f31b2f529d896fec0N.exe 84 PID 5112 wrote to memory of 3192 5112 97a2a0d34d98578f31b2f529d896fec0N.exe 84 PID 5112 wrote to memory of 3192 5112 97a2a0d34d98578f31b2f529d896fec0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\97a2a0d34d98578f31b2f529d896fec0N.exe"C:\Users\Admin\AppData\Local\Temp\97a2a0d34d98578f31b2f529d896fec0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\senis.exe"C:\Users\Admin\AppData\Local\Temp\senis.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD57e5e212bb4da49cbd7278eb59162cdff
SHA1acbdff244b10d834307602ccf399dd34fc260f24
SHA256f54bc571cfb5cefe6b2afcf252289706f054583d7a1206013f33fe47087eae23
SHA5120a1dfa80c579dc28ef75c322a12e8c9f00f142200d06df889b45c1a23a9829dbf9e28e86a109e5287abadd6b22531b2f006d0eed3e5efef479d51a4488c92cde