Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
e7f84a0cb8ac51a55c6c4df00a948650N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7f84a0cb8ac51a55c6c4df00a948650N.exe
Resource
win10v2004-20240802-en
General
-
Target
e7f84a0cb8ac51a55c6c4df00a948650N.exe
-
Size
44KB
-
MD5
e7f84a0cb8ac51a55c6c4df00a948650
-
SHA1
ea2dd4482c2b813130985bedc2ca2f31712b39ff
-
SHA256
9997dbed062d6dac78062c02d750683890809ce92b155da23ee11f7e502dfae5
-
SHA512
ece1adf7d2d0236192754a75bc94e71ce5962e0f12071eb522fc3bce3f198fb1ec0dc94d95f366e739e9e4fe860480203172c487e636df8be8a81d0c45884e5b
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAqjr4:bCDOw9aMDooc+vAqjU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation e7f84a0cb8ac51a55c6c4df00a948650N.exe -
Executes dropped EXE 1 IoCs
pid Process 4684 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7f84a0cb8ac51a55c6c4df00a948650N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4684 3420 e7f84a0cb8ac51a55c6c4df00a948650N.exe 91 PID 3420 wrote to memory of 4684 3420 e7f84a0cb8ac51a55c6c4df00a948650N.exe 91 PID 3420 wrote to memory of 4684 3420 e7f84a0cb8ac51a55c6c4df00a948650N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7f84a0cb8ac51a55c6c4df00a948650N.exe"C:\Users\Admin\AppData\Local\Temp\e7f84a0cb8ac51a55c6c4df00a948650N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4616,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=1008 /prefetch:81⤵PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD59c49cc8bafff1db36c2449c64c01c0f4
SHA197c446b4d278ac15ac98f5a3c95fa5c8ed0c7e0f
SHA2561b997baf60231b0bf2ac975b4aba6c1981c333004a7727d93e614cedddb676f2
SHA512574888cafadf9b7f49f9f82614b1489a04cbaeedbdefe0dda4c8ce4e03d3fe71533352dc057c7d43bcca7f157f3b7a8625e5d439e2a033b98247a6a2c38433c1