Analysis
-
max time kernel
103s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
f81842f9725cf1a1bb81bb0790c79320N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f81842f9725cf1a1bb81bb0790c79320N.exe
Resource
win10v2004-20240802-en
General
-
Target
f81842f9725cf1a1bb81bb0790c79320N.exe
-
Size
281KB
-
MD5
f81842f9725cf1a1bb81bb0790c79320
-
SHA1
e1f7bf243b03bfbc56d3ec68a45e229976322869
-
SHA256
87aacae4f59608d403306cc0dca5575540df07a2ab672097daf0ee920f79638f
-
SHA512
aaf521da8c45bc88c281d6c3737c44c6a3d08f3b263db84747f18a145a289027bd0d95874da7cdd9cfe7cc4018c258d170afb245c739ec1b8b88b811abac5106
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfK8:boSeGUA5YZazpXUmZhZ6SD8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f81842f9725cf1a1bb81bb0790c79320N.exe -
Executes dropped EXE 1 IoCs
pid Process 3180 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" f81842f9725cf1a1bb81bb0790c79320N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81842f9725cf1a1bb81bb0790c79320N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1004 wrote to memory of 3180 1004 f81842f9725cf1a1bb81bb0790c79320N.exe 94 PID 1004 wrote to memory of 3180 1004 f81842f9725cf1a1bb81bb0790c79320N.exe 94 PID 1004 wrote to memory of 3180 1004 f81842f9725cf1a1bb81bb0790c79320N.exe 94 PID 3180 wrote to memory of 4348 3180 a1punf5t2of.exe 95 PID 3180 wrote to memory of 4348 3180 a1punf5t2of.exe 95 PID 3180 wrote to memory of 4348 3180 a1punf5t2of.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f81842f9725cf1a1bb81bb0790c79320N.exe"C:\Users\Admin\AppData\Local\Temp\f81842f9725cf1a1bb81bb0790c79320N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5ae1243a587e9b55fe4e1c582ebae35dc
SHA135f0dccfaf10a12234578167cf663e73b4211558
SHA256f1b90266e2e311dc91e4bdaa82891d691948a4ed4c9c05916832fcc270cd0c85
SHA51239a0d72e715435b27b82248819b45464fba590f0111148d0f863e238a006dc85bafc5141c7b06b58c8b459c9f51e2483eda75510c0c1ba4e1eccfdde255844a5