Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
7e8032eae1d0ada9db00520343ff29a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7e8032eae1d0ada9db00520343ff29a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7e8032eae1d0ada9db00520343ff29a0N.exe
-
Size
15KB
-
MD5
7e8032eae1d0ada9db00520343ff29a0
-
SHA1
4fa64c62b8fa0404b8c4494ea8235598377c50c6
-
SHA256
672235a135c2d993f6285e92071185249b55044b18c16d2dd6db4ef79321ea8f
-
SHA512
7ba2f750c57d7db396ddb324e88e5cb5060332f241e268ab1fe70532b621dbdeb5c29a25ba4b65ef7742501bd9fdbce038a0f5abdd2a25f8d5845f378de8974e
-
SSDEEP
192:lHFwFITsYHSYHhL3k5t4dLpxuG/rowBM0UxfpzTC7NPAX:llwFITlhY5qdCQrowBMTfpoVo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 7e8032eae1d0ada9db00520343ff29a0N.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation kgfdfjdk.exe -
Executes dropped EXE 1 IoCs
pid Process 3592 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e8032eae1d0ada9db00520343ff29a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgfdfjdk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3592 3100 7e8032eae1d0ada9db00520343ff29a0N.exe 85 PID 3100 wrote to memory of 3592 3100 7e8032eae1d0ada9db00520343ff29a0N.exe 85 PID 3100 wrote to memory of 3592 3100 7e8032eae1d0ada9db00520343ff29a0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e8032eae1d0ada9db00520343ff29a0N.exe"C:\Users\Admin\AppData\Local\Temp\7e8032eae1d0ada9db00520343ff29a0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5358153d07956f5f231b9b73d7414cdef
SHA130be4617856bbef83f94fcfb953c91be8bbeb52b
SHA2563bf619a2285ec90f846504df5528fc05ee6dfb127f76ec4a01c284c35ba91060
SHA51225c1b43c6e6075e4a91f63becacefdd847ed85b51cf4dcb3784885173b7f797429969bb3e08374b054608b2c311645437af15432c2bb5da35863230414002076