Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
53492bb7c7307cda1f8818ce138b23a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
53492bb7c7307cda1f8818ce138b23a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
53492bb7c7307cda1f8818ce138b23a0N.exe
-
Size
67KB
-
MD5
53492bb7c7307cda1f8818ce138b23a0
-
SHA1
acda3998632c6d525b91ff70f464aa49c78bb4d4
-
SHA256
36fe5133ebc5a4431d3675acf6ec321da085f44aff574640bd43a4aa2ba13051
-
SHA512
2a3ad1da1ee1425be9a18bc09a2c0f5cd90365af24149ba79ca26d610b2f16f8bed537e347eae5380d146831fb9fa9ab2021fed42081f7fa62715286c09280b5
-
SSDEEP
768:zTAiYUVaQDKVSputCPsED3VK2+ZtyOjgO4r9vFAg2rqcjeZ8GswSD/E20Pzf:HAqamKwugYTjipvF2PeoE2af
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 53492bb7c7307cda1f8818ce138b23a0N.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation fcbnaf.exe -
Executes dropped EXE 1 IoCs
pid Process 2204 fcbnaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcbnaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53492bb7c7307cda1f8818ce138b23a0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2204 2780 53492bb7c7307cda1f8818ce138b23a0N.exe 84 PID 2780 wrote to memory of 2204 2780 53492bb7c7307cda1f8818ce138b23a0N.exe 84 PID 2780 wrote to memory of 2204 2780 53492bb7c7307cda1f8818ce138b23a0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\53492bb7c7307cda1f8818ce138b23a0N.exe"C:\Users\Admin\AppData\Local\Temp\53492bb7c7307cda1f8818ce138b23a0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5171c264fd705eab99fe00c2e45d391cd
SHA11f594b498d84e5b744fbed51358b7052548af295
SHA256aa284fd5920c9f300101dc072f8f314153c2493581faa89ffffa8ea4989fcd7e
SHA51285eacef9892a9c9cf02db7ecb2e51201b8f707c5db8e6b992427a83929630c9a5f9f211f6268e5e82c94f85d642b48fcfcc2e47e769e0f1b1cb8363d498ee345