Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe
Resource
win10v2004-20240802-en
General
-
Target
fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe
-
Size
25KB
-
MD5
841802b0bd0c6c52013040cce321c7d7
-
SHA1
708ec384628a77aaa93c8b0a478e08e04876989d
-
SHA256
fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3
-
SHA512
12a6e762326ed342318fb53079bb67d322b0fe1c513e4495b15e45498cfb82322def9f99d84695937db4520308074456514d41d0ea5fa1c868fa290e03168ed4
-
SSDEEP
384:6dsKewgzkVTF0VDRT3qcg666666666RJ70uIabjbt3TUA7DneAFABqJdMwp8XhPl:JKe7zUTWVlTVV0uIaOoDewfd3uhzp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 codecupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language codecupdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3872 wrote to memory of 2644 3872 fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe 83 PID 3872 wrote to memory of 2644 3872 fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe 83 PID 3872 wrote to memory of 2644 3872 fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe"C:\Users\Admin\AppData\Local\Temp\fd5290ff5969a0521898ced0b24e9d6aef30b5ef29c9f2fa4d7613cec395b7d3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\codecupdate.exe"C:\Users\Admin\AppData\Local\Temp\codecupdate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD529efb704d38483894c9b311d82c9e9ca
SHA1cc48308e1257fbc5b978508b5a2126ab0a6c1d27
SHA256aba1ce707e52ed5565f5adddf240a515659e2ca781e77bb8ad31fefad169033a
SHA51236c05300e00fd3017e73ba7c20e04d65162d75a62689df161d9cccb72c110b6a6304dd99b7167f2bc607df7aaa76c9fd46a4952a7310753910637102fa6531ae