Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
ed4f39d62c1156dd91e4cd84ebe3d120N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed4f39d62c1156dd91e4cd84ebe3d120N.exe
Resource
win10v2004-20240802-en
General
-
Target
ed4f39d62c1156dd91e4cd84ebe3d120N.exe
-
Size
59KB
-
MD5
ed4f39d62c1156dd91e4cd84ebe3d120
-
SHA1
2f86bc3aa4d9d729333a10efbba8ff4aaf7adb0d
-
SHA256
a8e282748c4562514d4f3cea87cc77134973cfe3bae4cb2cde15571184f9d635
-
SHA512
4b79637c89694d00c65597c4dd7297bcc62d0342feada62f590a435287829c5ed5b6216e8b8cc72f43f0042da90a4a79e5a66e122619234cc275d93ebdb40a4b
-
SSDEEP
384:PsjPGY2HXgrk8YhQ98E8I1XAV/QcaYpATUgch1A9NB/erxRXkoM1:PePG5H8+hKD8ISZQjkgs1lxRjM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation ed4f39d62c1156dd91e4cd84ebe3d120N.exe -
Executes dropped EXE 1 IoCs
pid Process 1568 winupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed4f39d62c1156dd91e4cd84ebe3d120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1568 4744 ed4f39d62c1156dd91e4cd84ebe3d120N.exe 92 PID 4744 wrote to memory of 1568 4744 ed4f39d62c1156dd91e4cd84ebe3d120N.exe 92 PID 4744 wrote to memory of 1568 4744 ed4f39d62c1156dd91e4cd84ebe3d120N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed4f39d62c1156dd91e4cd84ebe3d120N.exe"C:\Users\Admin\AppData\Local\Temp\ed4f39d62c1156dd91e4cd84ebe3d120N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\winupdate.exe"C:\Users\Admin\AppData\Local\Temp\winupdate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4616,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=1008 /prefetch:81⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD564fa3786587455db5a15cc20f7906818
SHA16d885a126d6aa7eae11409d49491040197e5233a
SHA2562f7f50fa897187846f7730a808b4430e86e17a00316cddbbade73a2c4dc9751c
SHA512ac64dc24c4c12488dee827bce8a41bf2c693b5df2dbed0f0f41fe6decc9adf4713d369f1c649bd6952e1f626d1796bc482ce22b96751f461b267b5973d30bb85