Analysis
-
max time kernel
136s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe
Resource
win10v2004-20240802-en
General
-
Target
4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe
-
Size
16KB
-
MD5
b04928d3c9ac3abaf0ff7cbeb6be9399
-
SHA1
c3c85f5e37c370ea8b5d3cdfd6aea399b1a4fc0b
-
SHA256
4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649
-
SHA512
697c5df22d5f9b62e8f1423b489520bbe3dad534364dfd46f570480568a85f4f7c33d784c67a051b40024410a20ebdb17e00a3876ea09ba80cbb7386d5e86e08
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYlR:hDXWipuE+K3/SSHgxmlR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation DEM859B.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation DEMDCC3.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation DEM338E.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation DEM895F.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation DEME039.exe -
Executes dropped EXE 6 IoCs
pid Process 4192 DEM859B.exe 2448 DEMDCC3.exe 1540 DEM338E.exe 1456 DEM895F.exe 3156 DEME039.exe 2448 DEM359D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEME039.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM359D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM859B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMDCC3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM338E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM895F.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1256 wrote to memory of 4192 1256 4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe 96 PID 1256 wrote to memory of 4192 1256 4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe 96 PID 1256 wrote to memory of 4192 1256 4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe 96 PID 4192 wrote to memory of 2448 4192 DEM859B.exe 101 PID 4192 wrote to memory of 2448 4192 DEM859B.exe 101 PID 4192 wrote to memory of 2448 4192 DEM859B.exe 101 PID 2448 wrote to memory of 1540 2448 DEMDCC3.exe 103 PID 2448 wrote to memory of 1540 2448 DEMDCC3.exe 103 PID 2448 wrote to memory of 1540 2448 DEMDCC3.exe 103 PID 1540 wrote to memory of 1456 1540 DEM338E.exe 106 PID 1540 wrote to memory of 1456 1540 DEM338E.exe 106 PID 1540 wrote to memory of 1456 1540 DEM338E.exe 106 PID 1456 wrote to memory of 3156 1456 DEM895F.exe 116 PID 1456 wrote to memory of 3156 1456 DEM895F.exe 116 PID 1456 wrote to memory of 3156 1456 DEM895F.exe 116 PID 3156 wrote to memory of 2448 3156 DEME039.exe 118 PID 3156 wrote to memory of 2448 3156 DEME039.exe 118 PID 3156 wrote to memory of 2448 3156 DEME039.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe"C:\Users\Admin\AppData\Local\Temp\4e068dc4a32148b532e213e5ed0dfae83a6020d6554be4ff65b31d4b2b478649.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\DEM859B.exe"C:\Users\Admin\AppData\Local\Temp\DEM859B.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\DEMDCC3.exe"C:\Users\Admin\AppData\Local\Temp\DEMDCC3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\DEM338E.exe"C:\Users\Admin\AppData\Local\Temp\DEM338E.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\DEM895F.exe"C:\Users\Admin\AppData\Local\Temp\DEM895F.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\DEME039.exe"C:\Users\Admin\AppData\Local\Temp\DEME039.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\DEM359D.exe"C:\Users\Admin\AppData\Local\Temp\DEM359D.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5faca1cab83911e786ac9e24f26854b69
SHA1326163cc49fa279df6f6cb0827e4d88573a9675a
SHA256c8e68bf0c0b7ad72cae207a5ffae80f3622ba7085fb8a31e340477f7a9527dcf
SHA5126c6b861ebfecd02d6800a66653d2c374eca2859980be867c24eda8e337a47c1eb4e44e708bb317d5365cce7b33838a13ea4acfdf5acfde1a336342e703ed59e3
-
Filesize
16KB
MD525cde0dba7db5b3def753defc439536e
SHA16aea2fc7cf4987ca2cc6ddd564e245ccf77feabc
SHA2563832cb209e565fd00b23fa2b2d95386c89dc54a96f3745760ad0e7f6e20d874b
SHA5121f6d358d712d213f9db7a670690a7aec2bff479176848ac4377bcf43f1e6cdb8defb3530cd0fc6b7b16c3c5afcd1abe40d4e2c8a2906d5fa7aa8a468a8eba903
-
Filesize
16KB
MD53ce153ea21777ba92c40be2c143f112a
SHA1e9bd54208587fd3887e79451dacda5a25ef9c113
SHA256395e218bf69b84b5eb5c42b94be234c373e2ac67813d19dfad8ccfbeb9a54c6c
SHA512fa281cfcd56411a0c06adf2e6a20dda0b4efba4815add6c074751497caee7560de498358a23687e0cf5da4395992389f0db6af579d1d087aa449975474d48bea
-
Filesize
16KB
MD5bae970114ad5cd279215236123cf0daf
SHA15e0cbc095f98d2ad8b4e8e8af0ef1cd1ef13cf27
SHA2568add7486ed1b48eb81d37bb702ccabbf670f34ee30c0dafa7d90ffafef1277bb
SHA512b8a4f3a3f3db6b0a4394e0907eb1474402460b9c0f46b08e2e6e6b0e151e36ed535aa0cae2b9425ec16f16c7e72caf1542dc24ca5e7dfe159b0f9921e588b8c2
-
Filesize
16KB
MD5640c01e97fb4c042020c55c010a5d1b5
SHA1eaa3606196e97d1427fb5eef5d6edd7f7ad16f70
SHA256e720b5cc38bafc5e05c732532e64434c0b850c90916b393c9b00d393bd025a4a
SHA512488c281a6bd10d27e61ce2f7ed49f57d063bba33e2634583f690e09e34e0346de9d46f5c612cac80e503a7d356f2aecff1149285a55ab90e5a92df8b9614262c
-
Filesize
16KB
MD5d044c2455a5d5e2e8317fc7b1f395296
SHA1e06c2913e1a1c033f8d8b41bc469974d74383dab
SHA256a24d76bc19984a49e002b7f820b4733105696cac4945e735efb721da9e49c797
SHA512c4a56afed2d4340c31259b7c5e105ea99856ad5439c78f01d68f0a6a8d79271b39d99bde1a7ce64a07ceee3a8d3a8bab571cc3be598e1a55c4ec703686e36518