Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
bdebddd9d1304655d271e44a0f66e0c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdebddd9d1304655d271e44a0f66e0c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bdebddd9d1304655d271e44a0f66e0c0N.exe
-
Size
390KB
-
MD5
bdebddd9d1304655d271e44a0f66e0c0
-
SHA1
36c7d89b3935a8c71c83cd1ccdd0fa562096b837
-
SHA256
b982f874cace61378e09dc290f18ef1f0796103516a1b3d8ea7017a95a8f0588
-
SHA512
a494e0a260bf98b10b6e6ee1a7fd36e91ee986d36b2301467671bbd5c548caf7cadddfd11ff928e66e74b3bd4d91fb292dfcd61414efa77a68ea8f81019c6558
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXRZ:nnOflT/ZFIjBz3xjTxynGUOUhXRZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation bdebddd9d1304655d271e44a0f66e0c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2364 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdebddd9d1304655d271e44a0f66e0c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2364 3212 bdebddd9d1304655d271e44a0f66e0c0N.exe 84 PID 3212 wrote to memory of 2364 3212 bdebddd9d1304655d271e44a0f66e0c0N.exe 84 PID 3212 wrote to memory of 2364 3212 bdebddd9d1304655d271e44a0f66e0c0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdebddd9d1304655d271e44a0f66e0c0N.exe"C:\Users\Admin\AppData\Local\Temp\bdebddd9d1304655d271e44a0f66e0c0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD5f25df2719caab3dbe5889ee8ae2baf40
SHA11dffe51643a014abb69722e4aecbdfd537e36129
SHA25613d199c56a31b4047a15d31cd01aa44c5208a6572c70cb13008a0ec1ed4e57f2
SHA512e37acf6d4f2bc02a6815f3f6c24078af52f599595f713e1ad769f9b8f460d334a2f10ab919de3ffe76760f4cb309486a558ceeee08307309d62dc5b8b0cb1abd