Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
564c363571dde4ae88a9b698e9e816c0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
564c363571dde4ae88a9b698e9e816c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
564c363571dde4ae88a9b698e9e816c0N.exe
-
Size
48KB
-
MD5
564c363571dde4ae88a9b698e9e816c0
-
SHA1
85be2522211cad0990fb45f632b5bd11b15a6eb0
-
SHA256
b6835d710af1bada3819540608abe2ee9c04818c4dd7c91c79e2c1d6adc85a06
-
SHA512
d1a69881f0b19aedb7394e5b2448fc631ff39019eef78c0b676f14466ccb968263759554111a77eb6bd7264b20ea1f0d91cebf38cb45a129cd10a8a019ddeeae
-
SSDEEP
768:aHcisZ7uyQZBDM8SPxw0fQ0qjKKRyg7ZG/gg2/Z:aHctJupci0fT7sZGIg8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 564c363571dde4ae88a9b698e9e816c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4168 legan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 564c363571dde4ae88a9b698e9e816c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language legan.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 4168 220 564c363571dde4ae88a9b698e9e816c0N.exe 93 PID 220 wrote to memory of 4168 220 564c363571dde4ae88a9b698e9e816c0N.exe 93 PID 220 wrote to memory of 4168 220 564c363571dde4ae88a9b698e9e816c0N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\564c363571dde4ae88a9b698e9e816c0N.exe"C:\Users\Admin\AppData\Local\Temp\564c363571dde4ae88a9b698e9e816c0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\legan.exe"C:\Users\Admin\AppData\Local\Temp\legan.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4188,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=3996 /prefetch:81⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5d06e618c38415d0845d0466dc54753f6
SHA143329e056eef5d06483a6baa5fe4564ca9a091cc
SHA25615f9cf4c4165b4bb872e5ce9ff9e360ac6109fcefbb57d0e1aa7fa299233ae7c
SHA512737b7ab1330773df40b01c27af6b27c6ca508bee80da230a8a51f983b4b5316f5ed4d91e6ecb314c3dd8c96a95277269c35e771e577280ae80e765f718fc6bb7