Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
6ac27aa3dacf2a5c77d81283512e4d20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6ac27aa3dacf2a5c77d81283512e4d20N.exe
Resource
win10v2004-20240802-en
General
-
Target
6ac27aa3dacf2a5c77d81283512e4d20N.exe
-
Size
88KB
-
MD5
6ac27aa3dacf2a5c77d81283512e4d20
-
SHA1
cd81db5e12742dd842c735d154b9d937c16feb85
-
SHA256
519d0f180787160012c380b2be352281c0adffe2dfbaa3855633680e35c01b32
-
SHA512
c2bd0dbda6530a5fe692357f8972aad236f7540220ea705018d962a81ed1c75b80b239e4f03d663c6c89a06e537bbf8f98e1d1b047ef782119029f7fca4ae765
-
SSDEEP
1536:IGsBuoFn7UZ+LtdgI2MyzNORQtOflIwoHNV2XBFV72B4lA7ZsbI8zNj:IGjot7UQLtdgI2MyzNORQtOflIwoHNVu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 6ac27aa3dacf2a5c77d81283512e4d20N.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgfdfjdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ac27aa3dacf2a5c77d81283512e4d20N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1692 3816 6ac27aa3dacf2a5c77d81283512e4d20N.exe 85 PID 3816 wrote to memory of 1692 3816 6ac27aa3dacf2a5c77d81283512e4d20N.exe 85 PID 3816 wrote to memory of 1692 3816 6ac27aa3dacf2a5c77d81283512e4d20N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ac27aa3dacf2a5c77d81283512e4d20N.exe"C:\Users\Admin\AppData\Local\Temp\6ac27aa3dacf2a5c77d81283512e4d20N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5f808bf0068cfb7917233eb26336384e0
SHA17630c40d12d2daba495bd2fd26afc087eb1fae34
SHA256db91beaf4ae900eec4fe0eaab6809e6abfc76d6138a1d92e65cc1ff7bacc240c
SHA5122c49b2c7fdca3a311f20d5d4024887c8cfce2cc2df8791d1de680b1f156dc7a26746ab8998b810b032535c966158739167b9afcfd06ea7a0d14b7986df2b2730