Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:44
Behavioral task
behavioral1
Sample
a763906d44e5ea389189e1dba72b7ea0N.exe
Resource
win7-20240903-en
General
-
Target
a763906d44e5ea389189e1dba72b7ea0N.exe
-
Size
72KB
-
MD5
a763906d44e5ea389189e1dba72b7ea0
-
SHA1
af6bcc5ee1dabd86be7113e8dfe8731a8d039a9c
-
SHA256
87f878ca59e44316c88fc1ac09a595899c4717a415d5a5b8792a0e561d4e7f6f
-
SHA512
9a8d3090d0b7934fca1a0be65de7ca5d50beb79fd9a257a6de2a0110ff8752335a4c82ac45ac587bb3d19d2dcd38a510cfa4acb88509bc488af7928a418c0a7f
-
SSDEEP
1536:yMp8CyThXLmVyuV7GNKLkjP5zuSQxIF3+ftQSK5Rv7:yMuZTQISGCuPFF8Q3+Cv5RD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation a763906d44e5ea389189e1dba72b7ea0N.exe -
Deletes itself 1 IoCs
pid Process 3644 Sysceamqhkqq.exe -
Executes dropped EXE 1 IoCs
pid Process 3644 Sysceamqhkqq.exe -
resource yara_rule behavioral2/memory/4188-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/files/0x0002000000022a83-10.dat upx behavioral2/memory/4188-41-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3644-42-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysceamqhkqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a763906d44e5ea389189e1dba72b7ea0N.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a763906d44e5ea389189e1dba72b7ea0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe 3644 Sysceamqhkqq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4188 wrote to memory of 3644 4188 a763906d44e5ea389189e1dba72b7ea0N.exe 91 PID 4188 wrote to memory of 3644 4188 a763906d44e5ea389189e1dba72b7ea0N.exe 91 PID 4188 wrote to memory of 3644 4188 a763906d44e5ea389189e1dba72b7ea0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a763906d44e5ea389189e1dba72b7ea0N.exe"C:\Users\Admin\AppData\Local\Temp\a763906d44e5ea389189e1dba72b7ea0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\Sysceamqhkqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysceamqhkqq.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54f9f8f8cf6cccdd63585c23b01711764
SHA1aecc0f5b80ca9b08010b3b5a1e2d215a18ed5cca
SHA25655e5adff354a6b5fffa29abe4ba144e88f778cb92772b27f64e0504c97dbc8e5
SHA5122d9837bfe2f9c599d06989601b476b186a85c28beb734d170289d599a0d52fc892a80ddbb068254ae1146a61415712cd3382f8fd7ce20467f16cef991182cc4d
-
Filesize
71B
MD560a041b3716e4a91ca626326f776796c
SHA1e6e029474a8c2c965c28181863cf8e59b36bc1a0
SHA256039b95ac920e8519cbd91e852a52112ea5f6e7cc47b2dd23de6d5b4d7f44d3a8
SHA5122d00d84a4fe4656d603e514a4b6d90150cd9b841b9ce15d5e7969071197ca65e515a8b88c5eb1f7b36ad200a9ea6b562afc48fcbd1bfe33c5263b84845c2f4ad