Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
344ea4d11e708ebfc928ac4fedf20d20N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
344ea4d11e708ebfc928ac4fedf20d20N.exe
Resource
win10v2004-20240802-en
General
-
Target
344ea4d11e708ebfc928ac4fedf20d20N.exe
-
Size
33KB
-
MD5
344ea4d11e708ebfc928ac4fedf20d20
-
SHA1
4af573038697a5fedafb00bb7210a693b3e4f8ea
-
SHA256
71a0aeacfab5550e2ff53bb8797d311cbec8a9dbb8875f38d790d61376d53b20
-
SHA512
fb0e7f93aabb9416e5fc14e091a7f5480982aed358e703a4c51f05ab267fda6d076be2c71e792fe968f1907d564ddcccff11c1297ec668169f44b5684ee617b6
-
SSDEEP
768:nQv/YOZIgQtz8GEkT9oe2lxUCuY9m9e9tdEI2MyzNORQtOflIwoHNM2XBFV7WB7s:Qv/pZIgQtz8GEkT9oe2lxUCHCetdEI2L
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 344ea4d11e708ebfc928ac4fedf20d20N.exe -
Executes dropped EXE 1 IoCs
pid Process 4364 hromi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 344ea4d11e708ebfc928ac4fedf20d20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hromi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 4364 1540 344ea4d11e708ebfc928ac4fedf20d20N.exe 87 PID 1540 wrote to memory of 4364 1540 344ea4d11e708ebfc928ac4fedf20d20N.exe 87 PID 1540 wrote to memory of 4364 1540 344ea4d11e708ebfc928ac4fedf20d20N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\344ea4d11e708ebfc928ac4fedf20d20N.exe"C:\Users\Admin\AppData\Local\Temp\344ea4d11e708ebfc928ac4fedf20d20N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\hromi.exe"C:\Users\Admin\AppData\Local\Temp\hromi.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5f703e6766510faabc5b47180b9ebc51b
SHA1d1e1962e85fd2ef9c1f5fe2a83353e04ebf065c3
SHA256b23a315cecbd416977f9e9cd0cd3061804370004d36927963a680bd9399b706b
SHA5125869ea194c6a16bbacf6a38c4f82d731c19d8d6b9466c07fa555056f82691853fe738fa1d6b65a37029e4105ddf4b17a28d7b75c6db1c2266f37cf17eb13bbd6