Analysis
-
max time kernel
89s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 06:14
Behavioral task
behavioral1
Sample
f60a531ffcf32b589db487f29415abd0N.exe
Resource
win7-20240903-en
General
-
Target
f60a531ffcf32b589db487f29415abd0N.exe
-
Size
61KB
-
MD5
f60a531ffcf32b589db487f29415abd0
-
SHA1
85a75d3abd7334d2f920d9056a5e1668f7e2b987
-
SHA256
3e0fd65ce536e336e9623c0358d278c404e656d87722a3461947e4d8b47d6089
-
SHA512
f9eaba74e0b0c357501fca0e04fd01242687fe044b44d69c441b68968a81f35d354fa99481095a92bfa8b75541024022659d87d1c1e94c52cfcce52f38e2b6df
-
SSDEEP
768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsPpzSd3m:r9l+W8xFt6sh7iQroCoRB0u0sPpzStm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation f60a531ffcf32b589db487f29415abd0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4520 bkgrnd.exe -
resource yara_rule behavioral2/memory/3608-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0009000000023442-7.dat upx behavioral2/memory/3608-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4520-17-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f60a531ffcf32b589db487f29415abd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkgrnd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3608 wrote to memory of 4520 3608 f60a531ffcf32b589db487f29415abd0N.exe 85 PID 3608 wrote to memory of 4520 3608 f60a531ffcf32b589db487f29415abd0N.exe 85 PID 3608 wrote to memory of 4520 3608 f60a531ffcf32b589db487f29415abd0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f60a531ffcf32b589db487f29415abd0N.exe"C:\Users\Admin\AppData\Local\Temp\f60a531ffcf32b589db487f29415abd0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD52f5bcafa2c0006d60fbd7af35b78fc37
SHA1ff8353742372fd64853a45d4b2f651a41ebf657f
SHA2566ad3061ff04fa2b9b9e77e830f9a978af765cd4975cf90f3a9235c3599682ec7
SHA512ff0ffcb6c4bd57ba1e48fb7a7849c88908d9447f9282229634ff38aa4d6fca759537bcc6f92aa4402d7ac7240b774965c1f5d48f1df5a287e9d2c6ba6d052869