Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
a1d8d7612dcefdb59e63f1742fad2e30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1d8d7612dcefdb59e63f1742fad2e30N.exe
Resource
win10v2004-20240802-en
General
-
Target
a1d8d7612dcefdb59e63f1742fad2e30N.exe
-
Size
46KB
-
MD5
a1d8d7612dcefdb59e63f1742fad2e30
-
SHA1
f6c973ecf6e1ebf4b54257831504ee287b069104
-
SHA256
6c8b6c0a1581a87f68fce1a7b42fc7e96a9fdea9bb0396ddcabaf9b09970b4b2
-
SHA512
9150e63ca89295c67ed376e3820d19e2ef3b6366b01843cf99b871d3d976c116b21360c101adf28aa54934ecb3d2495ba7cc928812c3497d9391e206fe4f892e
-
SSDEEP
768:DaP8mckxIrafCtdgI2MyzNtRQtONlIwoHNV2XBFV72B4lA7cN5Ze6/OVgXqCL0hw:Da0mc7ufCtdgI2MyzNtRQtONlIwoHNVk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation a1d8d7612dcefdb59e63f1742fad2e30N.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 hhcbrnaff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1d8d7612dcefdb59e63f1742fad2e30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhcbrnaff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1036 wrote to memory of 4864 1036 a1d8d7612dcefdb59e63f1742fad2e30N.exe 87 PID 1036 wrote to memory of 4864 1036 a1d8d7612dcefdb59e63f1742fad2e30N.exe 87 PID 1036 wrote to memory of 4864 1036 a1d8d7612dcefdb59e63f1742fad2e30N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d8d7612dcefdb59e63f1742fad2e30N.exe"C:\Users\Admin\AppData\Local\Temp\a1d8d7612dcefdb59e63f1742fad2e30N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5aede3dd551ce1b6bdb2a55d07265a3c0
SHA158ce722f7657b60ab6fead67bfe6667aa47a7c2b
SHA25636ef42a9583be38b863b8bdc72d65126f4f0125ba5e27edec457114237b50206
SHA512886bfccfebc90b7ee9737a35925e2416a17d02592336d1ab31a06fe14deb208ee3c8e1017f9a01528d8d82c71ba7148507323557586b0b3d5c8fb86f6c871ec6