Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe
Resource
win10v2004-20240802-en
General
-
Target
5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe
-
Size
8KB
-
MD5
ff47c50595eb3caafd81b2edb88be3d0
-
SHA1
3c6c0aebd2e6c33cda6ea2f7fd57f28dd4c92ea7
-
SHA256
5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4a
-
SHA512
960fd97f6bdde2abad4bbbca85a6a521f38beced30d28769951979ac55dc1657c07a1eeb3369b2e109f8fb159200ed3f229ea8fd5ca83f44f35d1a1931444b60
-
SSDEEP
192:GHmcWKG95nKfzrkxammIztbnAvn9rt89UWq:vKaVKfzr9mmIlC9xFWq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 sbueh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sbueh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2000 4496 5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe 81 PID 4496 wrote to memory of 2000 4496 5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe 81 PID 4496 wrote to memory of 2000 4496 5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe"C:\Users\Admin\AppData\Local\Temp\5221de3e12c99394a887898b3384e7dd0c266fcbbac4aeee8b04cf6caf4b4b4aN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\sbueh.exe"C:\Users\Admin\AppData\Local\Temp\sbueh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD538988f1abb7378f46a64842463efe317
SHA17844f72b21d3329a635614b02c4fe1a6c7494ea5
SHA256fcf95598da425532c3004d01634241aed404f159d4d3d6a0741ebea7dbe142a7
SHA5125f13e5d3247bf15ab1ed371a629ecc7cf5e78a179cbb4b3cac197a8dd4f36c97f3701ddfb11950dc1f850e491fe9910fe62dfc898b165183fa3d1297bc73465f