Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
a9b576a8703f1c890f080b607d6d55f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9b576a8703f1c890f080b607d6d55f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a9b576a8703f1c890f080b607d6d55f0N.exe
-
Size
281KB
-
MD5
a9b576a8703f1c890f080b607d6d55f0
-
SHA1
42100980c99b4061918948167f2045e626bf7949
-
SHA256
766fafe256e69366a285f2350e916f496b5c5852847f04bb22fbade7dd6d6960
-
SHA512
e6862ccf87b40269e6929c2933b85bd10d1081bd158b14077c488f7227f7d96ea53af175d7b2818afa17f3c9275ab974d174320036a436ee80254678fc1bd282
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfo:boSeGUA5YZazpXUmZhZ6Sx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation a9b576a8703f1c890f080b607d6d55f0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1476 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" a9b576a8703f1c890f080b607d6d55f0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9b576a8703f1c890f080b607d6d55f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4016 wrote to memory of 1476 4016 a9b576a8703f1c890f080b607d6d55f0N.exe 96 PID 4016 wrote to memory of 1476 4016 a9b576a8703f1c890f080b607d6d55f0N.exe 96 PID 4016 wrote to memory of 1476 4016 a9b576a8703f1c890f080b607d6d55f0N.exe 96 PID 1476 wrote to memory of 4352 1476 a1punf5t2of.exe 97 PID 1476 wrote to memory of 4352 1476 a1punf5t2of.exe 97 PID 1476 wrote to memory of 4352 1476 a1punf5t2of.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9b576a8703f1c890f080b607d6d55f0N.exe"C:\Users\Admin\AppData\Local\Temp\a9b576a8703f1c890f080b607d6d55f0N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5ef478227d4b42d65fb34b5c6f7a633e9
SHA12ba4844f0ff371e6cede69535c0b357dd678deb5
SHA25634f923c3ac6d248a3faed87a64e8ec88c81ca5842871824b83643cee35789497
SHA51210fbcfca2665c963977e26a3e3320ad235b6352857937d3ab52109f44fccc0ff09efafc585945fb23e1a50993adeba1a15202812db9534c70844d317e2c6da4e