Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
b75f309d88620c995b418917912db7d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b75f309d88620c995b418917912db7d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b75f309d88620c995b418917912db7d0N.exe
-
Size
711KB
-
MD5
b75f309d88620c995b418917912db7d0
-
SHA1
7f221fc97cea79ed5fe18aae47ed95d0507e7547
-
SHA256
bb60d6c5bd46b7aee32070f70166778babb3497b580d1f4ff9b70ff86215587b
-
SHA512
4f793d0f588c489ab25315046b7a9ef60b8fe18bd03f06cba3c3bd807529948e75c205de20f97d5435629c8911eacdf3690c4c4b5dfa7a25ce7bdee77bec6275
-
SSDEEP
12288:0Ed1lD17qtYpDGZmOQie4eOpn991X5pPOa57o0tYgWKnuxEj+BwkJHFQ1DO:0EblD17qsGZ6v4PPFqc7DWK4++fUDO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation b75f309d88620c995b418917912db7d0N.exe -
Executes dropped EXE 2 IoCs
pid Process 2016 Set-up.exe 2720 zinger.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5092 2720 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b75f309d88620c995b418917912db7d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zinger.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2016 Set-up.exe 2720 zinger.exe 2016 Set-up.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2016 4952 b75f309d88620c995b418917912db7d0N.exe 85 PID 4952 wrote to memory of 2016 4952 b75f309d88620c995b418917912db7d0N.exe 85 PID 4952 wrote to memory of 2016 4952 b75f309d88620c995b418917912db7d0N.exe 85 PID 4952 wrote to memory of 2720 4952 b75f309d88620c995b418917912db7d0N.exe 86 PID 4952 wrote to memory of 2720 4952 b75f309d88620c995b418917912db7d0N.exe 86 PID 4952 wrote to memory of 2720 4952 b75f309d88620c995b418917912db7d0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b75f309d88620c995b418917912db7d0N.exe"C:\Users\Admin\AppData\Local\Temp\b75f309d88620c995b418917912db7d0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\zinger.exe"C:\Users\Admin\AppData\Local\Temp\zinger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 4683⤵
- Program crash
PID:5092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2720 -ip 27201⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
793KB
MD59209338186015547dc9cd90258da09e4
SHA1a6f17d98b85ae07d2962296a25a9e04f35463dae
SHA2566be35fe8543aecfe21ece4a1077373a760e6d22012b32fb19a7a53ef15445b3d
SHA512d7fb31b050dfa7bf31bcdf35650076ba431aca2af293efa0ff85936c387ed70eacb05820b796130b8d7e35307b7a217c1b4eed20298e1c53ed272f19c37855db
-
Filesize
500KB
MD5f80b7590f3715521e1a6979771bfadd4
SHA1010a2f3ff60bee0684941fa27f2006e0f407070c
SHA256b37a53a715abd7a2ce6be93198a9d79ff6da1f8f0e7370687fe5f3153c094112
SHA51215362dc205daef29b7364efdc8176916e7aa72e6e41bbdbb7ae3f414e124443fdee9d447b2487e064314d2c36726cdf0c19d8e1d17c13a604d803288b91ae62f