Analysis
-
max time kernel
99s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
fc82894f3d1cab299b671cf17cada0e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc82894f3d1cab299b671cf17cada0e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
fc82894f3d1cab299b671cf17cada0e0N.exe
-
Size
49KB
-
MD5
fc82894f3d1cab299b671cf17cada0e0
-
SHA1
b4eef312f7c9cb753a94dd0d5380dea71ab90563
-
SHA256
a2f9c3ecc6e032ffc4fcc87541e562b1a718f2993f76d7c3331f53a3e9d6f41d
-
SHA512
33462ecd1f1095a783ce97707766bdd0ab57cb180d00aa7c7c9200a1530bc2161eba90d3899a61cb0ba6476088fba54ac1966233b6ca326555e9e994ec2c0910
-
SSDEEP
768:Q8eRHO9lFh0ul16sh7iQroCH/f+RjFBSuB2XVw5:Q9lOZ16sh7iQroCuRB0ux
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation fc82894f3d1cab299b671cf17cada0e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3360 bkgrnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc82894f3d1cab299b671cf17cada0e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkgrnd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4140 wrote to memory of 3360 4140 fc82894f3d1cab299b671cf17cada0e0N.exe 85 PID 4140 wrote to memory of 3360 4140 fc82894f3d1cab299b671cf17cada0e0N.exe 85 PID 4140 wrote to memory of 3360 4140 fc82894f3d1cab299b671cf17cada0e0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc82894f3d1cab299b671cf17cada0e0N.exe"C:\Users\Admin\AppData\Local\Temp\fc82894f3d1cab299b671cf17cada0e0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5612a06ef971248026348758e86944c52
SHA1ed2f39b2cd8a846a0e122bc35d0d885aaae9f080
SHA256ae351678ec021b407eac397d38063d00d2ebcc5c289f70c5b16f51ddbee80075
SHA5123df2c706536bf1b966cd1745dd00d7ab0bb3ea4cc9bc1d83cb7e33a3dff64b404a3a6f3c237d705cce94ed7d5fee8d9a37a429f45ca48702245a79eb80551a0b