Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 09:48
Behavioral task
behavioral1
Sample
d3c0fdc1eff7ccee3038399a717fa780N.exe
Resource
win7-20240708-en
General
-
Target
d3c0fdc1eff7ccee3038399a717fa780N.exe
-
Size
55KB
-
MD5
d3c0fdc1eff7ccee3038399a717fa780
-
SHA1
cd5445fe8c8068785eb16f6b65c040276c729f85
-
SHA256
3debcbb2058be98efbd78a54be73399f0b9b89d013ddf2ab2e48f68100e3b78d
-
SHA512
1a210dec0f1389c2654f49b56ebdf692334a6a2122a979412e8141753f1eb353f20e3a752070d37174aab91483c74e94ebae3605565a5112eed5348278b6b64f
-
SSDEEP
768:4oMn6f9zSX3e3cZ9SoD8XD33fyEpk58sCuSNcIcXR/QGQeCa57qEQwLGVPyMT18:26f9uusDSoDEXC58kSEYFa1vnLaya6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation d3c0fdc1eff7ccee3038399a717fa780N.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 upsec.exe -
resource yara_rule behavioral2/memory/5012-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x0008000000023567-7.dat upx behavioral2/memory/1704-12-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/5012-11-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1704-15-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upsec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c0fdc1eff7ccee3038399a717fa780N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5012 wrote to memory of 1704 5012 d3c0fdc1eff7ccee3038399a717fa780N.exe 92 PID 5012 wrote to memory of 1704 5012 d3c0fdc1eff7ccee3038399a717fa780N.exe 92 PID 5012 wrote to memory of 1704 5012 d3c0fdc1eff7ccee3038399a717fa780N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c0fdc1eff7ccee3038399a717fa780N.exe"C:\Users\Admin\AppData\Local\Temp\d3c0fdc1eff7ccee3038399a717fa780N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\upsec.exe"C:\Users\Admin\AppData\Local\Temp\upsec.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4152 /prefetch:81⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5bcef60f60deb14981aa9f8fb5b8313da
SHA17afbf67f119edef70717d9db8717dbcf8d11c26c
SHA2569285bd0cb8c334e84ca7289cd4d22f37733e8ff065e72694e2e8efa641d1c41f
SHA512c563bee3ade7d69ad9602f7e416c3e36b647241cfaf6653c287c1cb08a403d7e8455218c00c0fc8a8095cb38ed44748112d6e817c60d6ecee17ba799329c9c3f