Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
3370216507c54f57d2fe9bdc727ac1a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3370216507c54f57d2fe9bdc727ac1a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
3370216507c54f57d2fe9bdc727ac1a0N.exe
-
Size
86KB
-
MD5
3370216507c54f57d2fe9bdc727ac1a0
-
SHA1
740d88a3dfe8a62cfacd6bd5fa31e139d7a2b478
-
SHA256
7333dd6b3ec3789b7ed3d43a911b7b4bc491804742ce9f725611d47f1b1eaa5e
-
SHA512
d6d7aacf82de95e92c38348b1865363ad235ba8fac3e24bc6af8847a6fc42898eb679912eda2ac5cbf567038944c32c1fdfe4a2ecca6d821c88071f60c4511b8
-
SSDEEP
1536:IGsBuoFn7UZ+LtdgI2MyzNORQtOflIwoHNV2XBFV72B4lA7ZsbI8zWj:IGjot7UQLtdgI2MyzNORQtOflIwoHNVT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 3370216507c54f57d2fe9bdc727ac1a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2276 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3370216507c54f57d2fe9bdc727ac1a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgfdfjdk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2276 4556 3370216507c54f57d2fe9bdc727ac1a0N.exe 84 PID 4556 wrote to memory of 2276 4556 3370216507c54f57d2fe9bdc727ac1a0N.exe 84 PID 4556 wrote to memory of 2276 4556 3370216507c54f57d2fe9bdc727ac1a0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3370216507c54f57d2fe9bdc727ac1a0N.exe"C:\Users\Admin\AppData\Local\Temp\3370216507c54f57d2fe9bdc727ac1a0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5ea03cc2ff7459bd73901fb3f67c2dedd
SHA17c8deeda3d5969eae0fb029b0f90f194cb6d4e43
SHA256de64c57d4dfc91e3d1720de5761cef363e8923c49a68edc2583f3c6efa8b8c1b
SHA5126da81905b7345a7ed72095b2dbf06a1a7c259a429648153f482318ba87bd0a59c20b059fc4fa2a5a8fddc2db0f0459f87f57da66765eb3aa2468ed430c70d228