Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe
Resource
win10v2004-20240802-en
General
-
Target
20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe
-
Size
138KB
-
MD5
a72a99b91f5e47c3a6f40ef983343680
-
SHA1
a8cfc9541ea81f16d67ebd7900c8020b563d04e7
-
SHA256
20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684
-
SHA512
9d9d71e2f00d615c428ea409998ece26a7ba0dd8cc36a3ffa254ba775fcab03f6cca05d1967c9204a9468d1f48c556e34e5cccbb82cc8f1d4e31c592c41f9937
-
SSDEEP
1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjK6:xPd4n/M+WLcilrpgGH/GwY87mVmIXK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" 20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2096 2336 20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe 88 PID 2336 wrote to memory of 2096 2336 20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe 88 PID 2336 wrote to memory of 2096 2336 20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe 88 PID 2096 wrote to memory of 1984 2096 wn2ra4ohzdr.exe 90 PID 2096 wrote to memory of 1984 2096 wn2ra4ohzdr.exe 90 PID 2096 wrote to memory of 1984 2096 wn2ra4ohzdr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe"C:\Users\Admin\AppData\Local\Temp\20f3e8b4bcc6bb2ff900b0b95332b8d4284077269023a14c2b2f13625ced2684N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵PID:1984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5482a89cfdeb8cbea52a467f5c4c51d3f
SHA11e8907742a165a80b0f10777db49ed569da1b2f2
SHA25667fd47a6118f1e8a0ec9e403f50540c71d27dc0073db5142381dda59982a7b3a
SHA512535d1d9896d34680ab686a043bcba95d5b6ec9a4a9322c95655983788508dd592bd1ff9f79a1fe03f3a2e20f675d13ada2e3dc47abe00c89cc3cbd314f4adc4d