Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 01:00
Behavioral task
behavioral1
Sample
34896f2dfa27be228468789e1ee0f840N.exe
Resource
win7-20240708-en
General
-
Target
34896f2dfa27be228468789e1ee0f840N.exe
-
Size
145KB
-
MD5
34896f2dfa27be228468789e1ee0f840
-
SHA1
8c63366603c3fc4eb6a3f3cf4e6e9b51fe469088
-
SHA256
d720e1f34de54fcee5176bc5cdd54c5d69540c8e842116aaad27da19971334d2
-
SHA512
78490651bac4c1695b9f09a97b90e131dcc184c29f16b38a9f4933cd228434f3a8c947391ba9155bccfa9458ad1f32ef2e8122400d348d8e962cdace9193c31b
-
SSDEEP
3072:Rc2YlPYqPt7EYjQ9oDJG7TYPqhefZSw+WwKugfp4d2F:qf5Pt7VWUPqhNPgfpI2F
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 34896f2dfa27be228468789e1ee0f840N.exe -
Executes dropped EXE 1 IoCs
pid Process 4780 MWL_DecryptFile.exe -
resource yara_rule behavioral2/memory/3928-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x00090000000233b2-6.dat upx behavioral2/memory/4780-12-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3928-15-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4780-16-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34896f2dfa27be228468789e1ee0f840N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MWL_DecryptFile.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4780 MWL_DecryptFile.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4780 MWL_DecryptFile.exe 4780 MWL_DecryptFile.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3928 wrote to memory of 4780 3928 34896f2dfa27be228468789e1ee0f840N.exe 83 PID 3928 wrote to memory of 4780 3928 34896f2dfa27be228468789e1ee0f840N.exe 83 PID 3928 wrote to memory of 4780 3928 34896f2dfa27be228468789e1ee0f840N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\34896f2dfa27be228468789e1ee0f840N.exe"C:\Users\Admin\AppData\Local\Temp\34896f2dfa27be228468789e1ee0f840N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\MWL_DecryptFile.exe"C:\Users\Admin\AppData\Local\Temp\MWL_DecryptFile.exe" "C:\Users\Admin\AppData\Local\Temp\34896f2dfa27be228468789e1ee0f840N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5f870f701ef885f2ffe92eb9766d8df10
SHA15ef9d0b3eb778b5fdfe6a30994e1e60f2fd3d612
SHA256903122b7607aaea06fd0d6208f707b75f4d5af8283c412aa2d48c2d3cfd4f291
SHA5123e9d8e38af55505b1a50aeba1bb551bacd4e717fef1323fe8abc17273e40e92acf2789550719e7d72a1bc3cf1cfdf9dc5c2ba278eca4139225340fc25a65c4d7