Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 01:33

General

  • Target

    b9e2eb23a8734155a2258b2cb07a95e821559f31b5bbb11d36061221106b1abc.exe

  • Size

    1.8MB

  • MD5

    c13d4dae2fe94f888002450c704f0880

  • SHA1

    ac9d1292035d3da119f5f4da8245644bb111dc59

  • SHA256

    b9e2eb23a8734155a2258b2cb07a95e821559f31b5bbb11d36061221106b1abc

  • SHA512

    7fd78bcc1dc167434a697020b6cef55c10f0e890ea7b48507cf65748926c3cfdf4f2b461b2ee404cf31b8ae0287882f830854e8a67b2fd1ace792244a63274dd

  • SSDEEP

    49152:zyKWunwk44XiIkbMGZgbAZPjvpshekmZWMnxAh/kGqA0Pab:zUIwlNInG+bAZPjOjeWQCduP

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9e2eb23a8734155a2258b2cb07a95e821559f31b5bbb11d36061221106b1abc.exe
    "C:\Users\Admin\AppData\Local\Temp\b9e2eb23a8734155a2258b2cb07a95e821559f31b5bbb11d36061221106b1abc.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\b9e2eb23a8734155a2258b2cb07a95e821559f31b5bbb11d36061221106b1abc.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.tmp"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe

    Filesize

    4.3MB

    MD5

    319aae6a4aef8f05e10310fb440799c7

    SHA1

    ade3e3ba6028e0df95b8ea7378ea372d1eddf37f

    SHA256

    533a53c06be60f442f350e99ca06be7d4cd942738090cbc2cbe94db952b84ebd

    SHA512

    6623d2749e80743b218012d175a34186d04e6ee3a245debd85e17fdbfcf84f97808de2a6c9a10f809ef5d40c5b533e707f85f9af6c804895e5ff8f63016dd914