Analysis
-
max time kernel
98s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
18d51054a11a6a436044fe91168fe600N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
18d51054a11a6a436044fe91168fe600N.exe
Resource
win10v2004-20240802-en
General
-
Target
18d51054a11a6a436044fe91168fe600N.exe
-
Size
281KB
-
MD5
18d51054a11a6a436044fe91168fe600
-
SHA1
223e4e11f578a219fcad8ee3d6505f7bb7c52a44
-
SHA256
adc307aba3a4eb1b0ddc7658189944de7a3072dd5375c2db9ef7ed89394df328
-
SHA512
01d2db8be91743f5c5c93a952fc5523d15cc2f7d39fb14e95e3150552ad5a11fe0e804c12d12937c2a17373f711d34808e93ba4c9ad76220bb6e3782e4626295
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfK:boSeGUA5YZazpXUmZhZ6S3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
18d51054a11a6a436044fe91168fe600N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 18d51054a11a6a436044fe91168fe600N.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid process 3100 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
18d51054a11a6a436044fe91168fe600N.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 18d51054a11a6a436044fe91168fe600N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
18d51054a11a6a436044fe91168fe600N.exea1punf5t2of.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18d51054a11a6a436044fe91168fe600N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
18d51054a11a6a436044fe91168fe600N.exea1punf5t2of.exedescription pid process target process PID 2812 wrote to memory of 3100 2812 18d51054a11a6a436044fe91168fe600N.exe a1punf5t2of.exe PID 2812 wrote to memory of 3100 2812 18d51054a11a6a436044fe91168fe600N.exe a1punf5t2of.exe PID 2812 wrote to memory of 3100 2812 18d51054a11a6a436044fe91168fe600N.exe a1punf5t2of.exe PID 3100 wrote to memory of 4392 3100 a1punf5t2of.exe a1punf5t2of.exe PID 3100 wrote to memory of 4392 3100 a1punf5t2of.exe a1punf5t2of.exe PID 3100 wrote to memory of 4392 3100 a1punf5t2of.exe a1punf5t2of.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d51054a11a6a436044fe91168fe600N.exe"C:\Users\Admin\AppData\Local\Temp\18d51054a11a6a436044fe91168fe600N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5379c5358547403b71a149391df0f050d
SHA1923eed40910b82286e6cbd5ab4f9553b41d585ef
SHA256a976bdc54626a7d0af3c7429c4e2210326714ed12d5cc9fe259eb5dce88193bf
SHA51206abd358bbf233aa008d4f67de4e1772257971dc45b04bc8aefd2fb259b24029737594c9c7dab428234acd70c816658bcb81c45a1408afb4dfa1c37c6194265c