Analysis
-
max time kernel
119s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
a6c1bfe36034206314fce3ea6f857690N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6c1bfe36034206314fce3ea6f857690N.exe
Resource
win10v2004-20240802-en
General
-
Target
a6c1bfe36034206314fce3ea6f857690N.exe
-
Size
55KB
-
MD5
a6c1bfe36034206314fce3ea6f857690
-
SHA1
38527ceae9925cdb74f33eca5951e62ffe13dbc8
-
SHA256
c484035a28106b17475b76067885803fa9f6f9f65199797342319d8475c63c46
-
SHA512
d17170feefa1fc54423871adc4b7fd4cbd605313d38307bded8d1bdfcedaf16cbea8bb4543e385351511e836a48c8ccce86d46b2ebab9245686e98bf7861cd32
-
SSDEEP
768:EyW1yBtObv0U/qchMXEIPxQ3F5j0GoR+8Ode55B0nr:24Bobv7ZhMRxQE48OsB2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation a6c1bfe36034206314fce3ea6f857690N.exe -
Executes dropped EXE 1 IoCs
pid Process 548 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6c1bfe36034206314fce3ea6f857690N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 548 4480 a6c1bfe36034206314fce3ea6f857690N.exe 85 PID 4480 wrote to memory of 548 4480 a6c1bfe36034206314fce3ea6f857690N.exe 85 PID 4480 wrote to memory of 548 4480 a6c1bfe36034206314fce3ea6f857690N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6c1bfe36034206314fce3ea6f857690N.exe"C:\Users\Admin\AppData\Local\Temp\a6c1bfe36034206314fce3ea6f857690N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5eabfc32e0afe023d036aa20bae877dee
SHA1951f9ced182b3cf50834a4cc4039b40ce0d9dbde
SHA256b59a00d6cdcd08dde778eee4278cde5c9629ae59323f8883ab659138e6e01e7e
SHA512be7362bc52b2acc2452e6dda127c7077665abba995f91dfce536c3c422799f9208555cef9ba6f6cfa544acb0e6e69fcd3b85120687a346a45dc8b998d6b7f02e