Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe
Resource
win10v2004-20240802-en
General
-
Target
618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe
-
Size
26KB
-
MD5
ca23b228966b11b24883d90646e9eb40
-
SHA1
28715ecfa9cf637ad23023b6dd8685367d3fca64
-
SHA256
618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453b
-
SHA512
76cea34c0e01ba706fef423357b7a56572cc428460d1058679407fd0c96902c5a20b807c75412a6a61ec770e47dfb91f169d73e8914a36fb3b4e2408a51d68b8
-
SSDEEP
768:6B7HBXFw82t2C80lyaZ4+OkbR3/afjuVZC0r:u7HZFwzlyaZZ1RDn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 cnwog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnwog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3232 wrote to memory of 1668 3232 618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe 84 PID 3232 wrote to memory of 1668 3232 618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe 84 PID 3232 wrote to memory of 1668 3232 618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe"C:\Users\Admin\AppData\Local\Temp\618dbd95604ad389aeb237867e275e29906e46bfd20304ea1a00d053b239453bN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\cnwog.exe"C:\Users\Admin\AppData\Local\Temp\cnwog.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5fa34a74419e531620aab98def686ed8d
SHA15f7342a8eb444eb5787edc5fa69aa2ca6ba116d4
SHA256b4d5591f7b534cf7f730b64b691dae57c1c275c3178c18f2ceefd3a95d66c5a4
SHA512aa4515fb0dc4c084828cd24961fd5b173c03b16c0d44d3935f563682acf232da57d23ef9a6d6b2f80a1a125dfb86ef5926fe74df7b6bee52df70e312b1bafdd9