Analysis
-
max time kernel
95s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe
Resource
win10v2004-20240802-en
General
-
Target
6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe
-
Size
1.3MB
-
MD5
c8e6ab57a20f007dcf70636c5e0bb7b5
-
SHA1
f2e77c3cdec3d30d41202f12fc4b219ba0b14803
-
SHA256
6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66
-
SHA512
4cab7995fd2ffeca201703ccf6622c17ee10ec971a4d53762f1a814f680811a1f09da47a999f164952ff5ac3024b33534e4ec04667e71ce567862398a2876bb7
-
SSDEEP
24576:GW4syErVwESAyaEMRjXuMrvjk6V0cETycj0K8g6IQZCDBINvqLu+b2gWxJPt:j4sydAynMRlrb3JNXglaZ+CXP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe -
Executes dropped EXE 1 IoCs
pid Process 4460 nchsetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\DeskFXInstall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe" nchsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nchsetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4460 1680 6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe 85 PID 1680 wrote to memory of 4460 1680 6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe 85 PID 1680 wrote to memory of 4460 1680 6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe"C:\Users\Admin\AppData\Local\Temp\6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe"C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\6818d2ff587aba162f2d0cd9a443869776b83424f17510426e5b60c587ad7c66.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD555f7e8e7acf0e36d4bd9ae5a17120d20
SHA17c6f3e38fd340b073e8c6cfb6532ba773faba019
SHA2560c5a226b8915aa6ed622d88ae4a10318fcb24f809f824df0bc0249b28da06f21
SHA5124370bde6dfb55a0a81a02bfa65194611fa288911a45356367549f45ac2abfa5ecff28c18da8c0f13bea041d85beb60eae5a4aed0994ec463f6829fc42afbb494