Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
79fb46e342e3ad273f60269f02df4d50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79fb46e342e3ad273f60269f02df4d50N.exe
Resource
win10v2004-20240802-en
General
-
Target
79fb46e342e3ad273f60269f02df4d50N.exe
-
Size
56KB
-
MD5
79fb46e342e3ad273f60269f02df4d50
-
SHA1
77f7d93b70a30a1582f3eefa8dc01690dcb52155
-
SHA256
b9913cbdd4a239682e7f136eb4bc163d17e874b644bb8296775170718c56b958
-
SHA512
75f1ad89b36d6e731cb92bbe0076ac90fa47e541ba8a8ff90afcf863bc6f2d87be58d6a4011f11ac61c54b2165021647fa7701eaff5b9554b38c3e37ed9751b4
-
SSDEEP
768:D00UHf57LnWykdBdusOAL/2DH9owR97k9/l4ElXYWFoHiPI6zDwRT6cBJhFd/B5+:D00URPnKfZrT2DawRR8JfP3QZB355B/s
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 79fb46e342e3ad273f60269f02df4d50N.exe -
Executes dropped EXE 1 IoCs
pid Process 4072 odbc32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Network Services = "\"C:\\Windows\\SysWOW64\\odbc32.exe\" /O0" odbc32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\odbc32.exe 79fb46e342e3ad273f60269f02df4d50N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79fb46e342e3ad273f60269f02df4d50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odbc32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2436 wrote to memory of 4072 2436 79fb46e342e3ad273f60269f02df4d50N.exe 84 PID 2436 wrote to memory of 4072 2436 79fb46e342e3ad273f60269f02df4d50N.exe 84 PID 2436 wrote to memory of 4072 2436 79fb46e342e3ad273f60269f02df4d50N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\79fb46e342e3ad273f60269f02df4d50N.exe"C:\Users\Admin\AppData\Local\Temp\79fb46e342e3ad273f60269f02df4d50N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\odbc32.exe"C:\Windows\system32\odbc32.exe" /O02⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5d6cc4650bc4ddec0814828be56f925df
SHA1b043db6c7099f8c72124d5a56c32771f9ffd2372
SHA2564fdf6db7f9a51963f9465c9f4f0155885febdc21a59705f5e22fa6949683d33f
SHA51273b4fe6298c151cb5465883a6a96eb4bfbf4c9108808d9626db5c8dd20e6df84c692122d850889b72868deb9551fcb16eb736ec5547007f46e68304fa4ffcf5f