Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 03:58

General

  • Target

    b1107655d24c87a906e69418caf5987db2dc899fe468e4ead32fef9b86ce5e2f.exe

  • Size

    584KB

  • MD5

    a0073e2e52960bbae7bd9169ecfc4e2c

  • SHA1

    11e3345c9b4a6adadbb9a5d99ba8a011e03f7eca

  • SHA256

    b1107655d24c87a906e69418caf5987db2dc899fe468e4ead32fef9b86ce5e2f

  • SHA512

    e48d1e3fdfc9feaaf741dc97df5e971dff88d2f914c4c7b6ff75dc7de27aeef4ab8bc52c208f2ddaf1616368642806b26790aba69460ab346a19f8e009bb2e91

  • SSDEEP

    6144:yXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZoAX0cNS5Gv:yX7tPMK8ctGe4Dzl4h2QnuPs/ZoPcv

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1107655d24c87a906e69418caf5987db2dc899fe468e4ead32fef9b86ce5e2f.exe
    "C:\Users\Admin\AppData\Local\Temp\b1107655d24c87a906e69418caf5987db2dc899fe468e4ead32fef9b86ce5e2f.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Users\Admin\AppData\Local\Temp\word\word.exe
      "C:\Users\Admin\AppData\Local\Temp\word\word.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\recos\logs.dat

    Filesize

    144B

    MD5

    1cd3a0296f490725e1c83f64f74d8689

    SHA1

    219b3c6340542790fb10146323d12615aca728a4

    SHA256

    d211a11d8365d39fa51523e13959f6b42756308f77825e0b1e863c822d5de9e5

    SHA512

    bf752665b466182ee090c068ab2991e478891c0082cb5a4d20a6a3baca917326bf07ca41593c6d85860a004fcf18dce0d75c55e9fdf7ab0de9f4d3b1282cbc75

  • C:\Users\Admin\AppData\Local\Temp\word\word.exe

    Filesize

    584KB

    MD5

    a0073e2e52960bbae7bd9169ecfc4e2c

    SHA1

    11e3345c9b4a6adadbb9a5d99ba8a011e03f7eca

    SHA256

    b1107655d24c87a906e69418caf5987db2dc899fe468e4ead32fef9b86ce5e2f

    SHA512

    e48d1e3fdfc9feaaf741dc97df5e971dff88d2f914c4c7b6ff75dc7de27aeef4ab8bc52c208f2ddaf1616368642806b26790aba69460ab346a19f8e009bb2e91