Analysis
-
max time kernel
96s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
92f5a8bafbd0fbc96a8d226701048720N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
92f5a8bafbd0fbc96a8d226701048720N.exe
Resource
win10v2004-20240802-en
General
-
Target
92f5a8bafbd0fbc96a8d226701048720N.exe
-
Size
34KB
-
MD5
92f5a8bafbd0fbc96a8d226701048720
-
SHA1
abc636423bac5af9cce3d6d18c5648db5ef0456d
-
SHA256
518da9b538a06ec732373956c4a4d6be3e10acfa22a9b6a778b7638e3eb2581b
-
SHA512
e587da244fa88386473d6ca538993b504a89de9834df4a2baf96db0bc072d20cfd954affbaf96d6a851a532369f4ab8e0f372154d8b0ae91ff036bf0e2bfeb3f
-
SSDEEP
192:lSjgkITi8ZpHi+CJEIMIHVReGHcBM0olFs/j6NnfLI46W/6pq/:CITpZpCV/HcP/uNfDk4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 92f5a8bafbd0fbc96a8d226701048720N.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation hfdfjdk.exe -
Executes dropped EXE 1 IoCs
pid Process 3820 hfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92f5a8bafbd0fbc96a8d226701048720N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfdfjdk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3820 4928 92f5a8bafbd0fbc96a8d226701048720N.exe 84 PID 4928 wrote to memory of 3820 4928 92f5a8bafbd0fbc96a8d226701048720N.exe 84 PID 4928 wrote to memory of 3820 4928 92f5a8bafbd0fbc96a8d226701048720N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\92f5a8bafbd0fbc96a8d226701048720N.exe"C:\Users\Admin\AppData\Local\Temp\92f5a8bafbd0fbc96a8d226701048720N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\hfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\hfdfjdk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5f9a4a60f1aa9dad706bd4994a8359442
SHA1fb6d41279a97ccf6802f65bbb53827c8496e1a7b
SHA2567c063aa4256703acd74b208a65f279775a76dccd6f636389015f05ce09358b7b
SHA51295e8d152bcf9c83ff345819547dcd53506dcb477fbfc27e917e70cf6bb5431be744c3df7277be3a2dc7688722e9c23b6f1df6f55d50a3c9b3fd3de672befe440