Analysis
-
max time kernel
108s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
75089602406c80e98a7d25e078231540N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75089602406c80e98a7d25e078231540N.exe
Resource
win10v2004-20240802-en
General
-
Target
75089602406c80e98a7d25e078231540N.exe
-
Size
32KB
-
MD5
75089602406c80e98a7d25e078231540
-
SHA1
5bbd65ff8882f93e90156d319388a54a4f1fa06c
-
SHA256
f167ddf3a7b651967def259b50ee97ec076415530cc72143dc4412fcc69ab194
-
SHA512
b89b466f9e45299c57f0413351c4957abb71b8838bb6dc55769f20d05318346573183409ca29f6c91d39f30296c25f472f1086bfa37af18152d6fbb6ec1ffb87
-
SSDEEP
768:gWFtq/S5ITXT5PZ3Hzpu9fWWq53E7YS9VXm:lq656PJpu9fWWq53Y9VXm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 75089602406c80e98a7d25e078231540N.exe -
Executes dropped EXE 1 IoCs
pid Process 5048 flimgt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flimgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75089602406c80e98a7d25e078231540N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 5048 1432 75089602406c80e98a7d25e078231540N.exe 86 PID 1432 wrote to memory of 5048 1432 75089602406c80e98a7d25e078231540N.exe 86 PID 1432 wrote to memory of 5048 1432 75089602406c80e98a7d25e078231540N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\75089602406c80e98a7d25e078231540N.exe"C:\Users\Admin\AppData\Local\Temp\75089602406c80e98a7d25e078231540N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\flimgt.exe"C:\Users\Admin\AppData\Local\Temp\flimgt.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5760869626d0d9786b5cced3ae70eb6a2
SHA127d529fd1a1e842c99be62d6ad8ef4260536b894
SHA25660fdcea9fabcc2cf3745d39f6bb7baf4d9e2a313bef7094b7cf9ba909075c9ab
SHA5129db7086ee1df043ec88c75a271291f0a6a149e69bfe57799d6c4c03ab9be1ac946c7dc7494e0429318653bd3a9f9b5dacfe24f5391c0423fbf193cfe84f9eea1