Analysis
-
max time kernel
115s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe
Resource
win10v2004-20240802-en
General
-
Target
fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe
-
Size
6KB
-
MD5
9f0bcc5983d3f2173f0d32c1dd8b488d
-
SHA1
1859e8df47fe917338ab90080cf3648a3c8495cd
-
SHA256
fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1
-
SHA512
4bc50b17e5f5bfbf2cf1793a5483927e100244e6b193f65fafee5d75a5012872b01be83285ed273be865d423cd5a102cfdf07da668cf5d552670558235a490c2
-
SSDEEP
96:vSoXWOsIYxuHnnwR2UI2ClAhxeKan1+Zmqk:qoJvnwR2hBAaKa1U9k
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe -
Executes dropped EXE 1 IoCs
pid Process 1168 retro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retro.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 1168 4348 fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe 82 PID 4348 wrote to memory of 1168 4348 fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe 82 PID 4348 wrote to memory of 1168 4348 fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe"C:\Users\Admin\AppData\Local\Temp\fdfef314287995bdd2bf982f223afedd66f30dc320d729a1014c7c7d675b78c1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\retro.exe"C:\Users\Admin\AppData\Local\Temp\retro.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5cecbe95d2dd74694b2db0e1823f4903c
SHA1a420c13bb017c313a04ed96b7a9bd9dfc0d69465
SHA256f598a3166656b2dcd396ed67e96b9109bdfd6d9fb2e02fa03e8a9006016111dd
SHA512954b391307c0111bf8805cc8c05c7e2e51914aaf63abfdf483c1281eedcc8dedf26e69976078f28417e171d9684fac7161100823e96bc860ddca687e851eac65