Analysis
-
max time kernel
119s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
b4be9b983ffb0863e4aba2fa8ec21b40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4be9b983ffb0863e4aba2fa8ec21b40N.exe
Resource
win10v2004-20240802-en
General
-
Target
b4be9b983ffb0863e4aba2fa8ec21b40N.exe
-
Size
56KB
-
MD5
b4be9b983ffb0863e4aba2fa8ec21b40
-
SHA1
5a2701315546dea40df7f6c4904482a0482e1d54
-
SHA256
dcf172944dc961150a16128525e918327a4c036dd7381f45ad2d93564fad9842
-
SHA512
0a7aef18b8b66585be4a880ad846c86f038615bba3c98d2cd803b556ce9bcd69416eb7612d99a07a72c2104531673150f92c78d45e080ce028ed3a0aad55db43
-
SSDEEP
768:EyW1yBtObv0U/qchMXEIPxQ3F5j0GoR+8Ode55B0E:24Bobv7ZhMRxQE48OsBl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation b4be9b983ffb0863e4aba2fa8ec21b40N.exe -
Executes dropped EXE 1 IoCs
pid Process 4852 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4be9b983ffb0863e4aba2fa8ec21b40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4852 4660 b4be9b983ffb0863e4aba2fa8ec21b40N.exe 85 PID 4660 wrote to memory of 4852 4660 b4be9b983ffb0863e4aba2fa8ec21b40N.exe 85 PID 4660 wrote to memory of 4852 4660 b4be9b983ffb0863e4aba2fa8ec21b40N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4be9b983ffb0863e4aba2fa8ec21b40N.exe"C:\Users\Admin\AppData\Local\Temp\b4be9b983ffb0863e4aba2fa8ec21b40N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD52ef7514af7e1869f0d0c3ed3016f5694
SHA18980eac1439291a607e82f8b07b543c06c700529
SHA25644f3a4bf0885ed1925251206fb6d3fb044454e4ca64bd29f9d489d87db87b9a8
SHA5127ed661d03a05ba806da7bf06fc2735b513e6eb879fbe32b46744d6d4b08effc61414fa4fae6c504a58cfdbd39b8ebcef40b256ef9e1f749adc0dc4b77ed1578f