Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 14:21
Behavioral task
behavioral1
Sample
3d658ea8d1d631607e0f947e8dd78d60N.exe
Resource
win7-20240705-en
General
-
Target
3d658ea8d1d631607e0f947e8dd78d60N.exe
-
Size
20KB
-
MD5
3d658ea8d1d631607e0f947e8dd78d60
-
SHA1
5c5ea949d1ccb802135b4926765b767892445efc
-
SHA256
f756eb7ac1830a7d6f2d6494995e483421895c125f335106b1e023c05ca602a6
-
SHA512
05236af35623c3a6f85a4740a32ab25d723d6ef8309d5709419f4b29cb350b5ebeb676a3b037b12b8586242733df61994738255c3a86bda668d655e6002b2298
-
SSDEEP
384:UCcGwJGWjzc7Vmm2IQ0wgvRcOAUZtM+LUr/afjuByAty:TcfGWaZ2IQ0NlM+6/afjuVy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 3d658ea8d1d631607e0f947e8dd78d60N.exe -
Executes dropped EXE 1 IoCs
pid Process 1168 cnwog.exe -
resource yara_rule behavioral2/memory/4004-0-0x0000000000C30000-0x0000000000C3C000-memory.dmp upx behavioral2/files/0x0009000000023342-7.dat upx behavioral2/memory/1168-10-0x0000000000650000-0x000000000065C000-memory.dmp upx behavioral2/memory/4004-13-0x0000000000C30000-0x0000000000C3C000-memory.dmp upx behavioral2/memory/1168-16-0x0000000000650000-0x000000000065C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d658ea8d1d631607e0f947e8dd78d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnwog.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4004 wrote to memory of 1168 4004 3d658ea8d1d631607e0f947e8dd78d60N.exe 84 PID 4004 wrote to memory of 1168 4004 3d658ea8d1d631607e0f947e8dd78d60N.exe 84 PID 4004 wrote to memory of 1168 4004 3d658ea8d1d631607e0f947e8dd78d60N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d658ea8d1d631607e0f947e8dd78d60N.exe"C:\Users\Admin\AppData\Local\Temp\3d658ea8d1d631607e0f947e8dd78d60N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\cnwog.exe"C:\Users\Admin\AppData\Local\Temp\cnwog.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5354b94a662faba172856cbd0746833b3
SHA1341afae76bf71fefc51c6c3a0e20c6fe3cabf666
SHA256ba04910998925a6fd5cb43e17bbb78de93619fec32e11d9b4f4ca72b5ec177c9
SHA512a1de1444118189b150d30210d98b279f1c99e0f574ff3fef84e151342ebbb4261608888ba0446a5bced93004d5cc798b3b625f2a7a4ce9d790b8b92b30614bf4