Overview
overview
10Static
static
315540D1498...BF.exe
windows7-x64
315540D1498...BF.exe
windows10-2004-x64
31D34D800AA...EE.exe
windows7-x64
31D34D800AA...EE.exe
windows10-2004-x64
3301210D555...6F.exe
windows7-x64
10301210D555...6F.exe
windows10-2004-x64
1060C01A897D...64.exe
windows7-x64
1060C01A897D...64.exe
windows10-2004-x64
1067E4F53018...CB.exe
windows7-x64
1067E4F53018...CB.exe
windows10-2004-x64
108953398DE4...31.exe
windows7-x64
108953398DE4...31.exe
windows10-2004-x64
10D883DC7ACC...64.exe
windows7-x64
3D883DC7ACC...64.exe
windows10-2004-x64
3DF5A394AD6...94.exe
windows7-x64
10DF5A394AD6...94.exe
windows10-2004-x64
10F1E546FE9D...FB.exe
windows7-x64
7F1E546FE9D...FB.exe
windows10-2004-x64
7F77DB63CBE...1F.exe
windows7-x64
10F77DB63CBE...1F.exe
windows10-2004-x64
10Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
15540D149889539308135FA12BEDBCBF.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
15540D149889539308135FA12BEDBCBF.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
1D34D800AA3320DC17A5786F8EEC16EE.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
1D34D800AA3320DC17A5786F8EEC16EE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
301210D5557D9BA34F401D3EF7A7276F.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
301210D5557D9BA34F401D3EF7A7276F.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
60C01A897DD8D60D3FEA002ED3A4B764.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
60C01A897DD8D60D3FEA002ED3A4B764.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
67E4F5301851646B10A95F65A0B3BACB.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
67E4F5301851646B10A95F65A0B3BACB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
8953398DE47344E9C2727565AF8D6F31.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
8953398DE47344E9C2727565AF8D6F31.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
D883DC7ACC192019F220409EE2CADD64.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
D883DC7ACC192019F220409EE2CADD64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
DF5A394AD60512767D375647DBB82994.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
DF5A394AD60512767D375647DBB82994.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
F1E546FE9D51DC96EB766EC61269EDFB.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
F1E546FE9D51DC96EB766EC61269EDFB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
F77DB63CBED98391027F2525C14E161F.exe
Resource
win7-20240708-en
General
-
Target
F1E546FE9D51DC96EB766EC61269EDFB.exe
-
Size
572KB
-
MD5
f1e546fe9d51dc96eb766ec61269edfb
-
SHA1
4edea5d41c6c5888f95f77a048982eae57612818
-
SHA256
a474534bf4185fc604b66396b69fb3a032c9f47b38bcf5ab4e9104d25cfe1054
-
SHA512
e9a9fbd99ef9f8463c4c3da914c0b77f5112ad0b97d51862a29cfb65848e7fd3e21f48603fe41c31e3a28bde013c4263244a3363806ead86b9b8931038825555
-
SSDEEP
12288:X81Ed0hYcVhrGFTlZaVXVYr92FFilE5AUJHPx6hhsH4u0Q7w:X81EdVcVhGNDyYr9Wi4NJccHM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation F1E546FE9D51DC96EB766EC61269EDFB.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 nvdasd.exe -
resource yara_rule behavioral18/files/0x000b000000023470-38.dat upx behavioral18/memory/5116-45-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral18/memory/5116-56-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral18/memory/5116-56-0x0000000000400000-0x00000000004BE000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F1E546FE9D51DC96EB766EC61269EDFB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvdasd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3484 wrote to memory of 5116 3484 F1E546FE9D51DC96EB766EC61269EDFB.exe 92 PID 3484 wrote to memory of 5116 3484 F1E546FE9D51DC96EB766EC61269EDFB.exe 92 PID 3484 wrote to memory of 5116 3484 F1E546FE9D51DC96EB766EC61269EDFB.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\F1E546FE9D51DC96EB766EC61269EDFB.exe"C:\Users\Admin\AppData\Local\Temp\F1E546FE9D51DC96EB766EC61269EDFB.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\nvdasd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\nvdasd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD53360897e67021409d9af186afd87402a
SHA112fc885e66ee0f979040453aec6969e234a45c30
SHA256f739684c15081572f25f66afc44be80696e1072f60a0fc5a03650d407d039f38
SHA512edf98d5ab94d67b22f65ea789f2e92c863bbd701f43ec0f6ce8eac7550dfa479f87b96da268f5d8f29f1848bb3beca3ec601e6e8c6beacee167ad731ef8af0df
-
Filesize
403KB
MD534268d3ef6492f885dc2a3a7d4f89272
SHA1219cfb6d8ae4ff44afb3da2beeb258bb2fc7e70f
SHA256b77a0d1d979bac7df94edf045ebcdfc143d604675254396ac8371c24d0641300
SHA51253c0b8d1d82bc0fdb75f124bac6f43b75a6656ccdaaf13bea690168f49ce6e2ca42ee2d822addd0175017409bf75ec338dfd30cb37a99445f31090f972c31f81
-
Filesize
112B
MD59126ea7235e907f78e38447c1bb942e9
SHA19997f78d450ea240652a265890a808cc8e63e946
SHA2563f2ddbcc7837cd0912a5a4f8eb85da5c223602f7450e46594d93cfaba05b390a
SHA512ded28d9b913e24cba4acda44646fb2745c120ece59f4366df1c9831e284d028a020e941b173cafe4d7d6a46a8d7b576c14aabb27d5ffffe4b5c4a1e506628e5c