Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
d0b65a8fb3c9b28efe87dd18fbae9220N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d0b65a8fb3c9b28efe87dd18fbae9220N.exe
Resource
win10v2004-20240802-en
General
-
Target
d0b65a8fb3c9b28efe87dd18fbae9220N.exe
-
Size
9KB
-
MD5
d0b65a8fb3c9b28efe87dd18fbae9220
-
SHA1
40a4e259f499c916cfe48e99e34f7f47f6391f3c
-
SHA256
2825a2c24f4aa6627f5f42b887af258e835fc47051064ec07825390041c54542
-
SHA512
2371bc17611c615f24ed9f8d310732fd08c33a6d20e02c52cdca32fc694fe353543d32edeac40a1ce704d492198a222f29032ede050959666e05230b9eb71b97
-
SSDEEP
96:aeZMykBKBK4aVSTmAMtrD9Y1MzeLjjtTZF00BDvIXUFc1LcihSyf3XDjQUsCQtcs:aPo4ITW2KqTt9F02fFca5yfVgcDuy7dU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation d0b65a8fb3c9b28efe87dd18fbae9220N.exe -
Executes dropped EXE 1 IoCs
pid Process 1944 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0b65a8fb3c9b28efe87dd18fbae9220N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgfdfjdk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4524 wrote to memory of 1944 4524 d0b65a8fb3c9b28efe87dd18fbae9220N.exe 86 PID 4524 wrote to memory of 1944 4524 d0b65a8fb3c9b28efe87dd18fbae9220N.exe 86 PID 4524 wrote to memory of 1944 4524 d0b65a8fb3c9b28efe87dd18fbae9220N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0b65a8fb3c9b28efe87dd18fbae9220N.exe"C:\Users\Admin\AppData\Local\Temp\d0b65a8fb3c9b28efe87dd18fbae9220N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5bb8b86bef630dc95f39a4dc5f3375d4a
SHA1328c33782ef55a1ee85812885c387cab69d6fea5
SHA2562c8f1a133b074b430b533c841eb9ffbfbd8cb46c4438f3f6ee26666398a79fea
SHA5121c848ff0d9092c32c8e45b4282b36bfc06e840ef24ef8745429e4d475bd40210ce6d95b7e8bba9f160787ed0124c9296e8ce205c1130ab33d87ec51794cf3a42