Analysis
-
max time kernel
106s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe
Resource
win10v2004-20240910-en
General
-
Target
b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe
-
Size
62KB
-
MD5
50d5d68b0f4febc4c181fc8ef4f0b050
-
SHA1
677ddd69ff3c724738a8d21bdd32d2d1fb75265f
-
SHA256
b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bd
-
SHA512
5304a77a3998c8cf02f6a4bf8071ca6fb81c44725cd27090dc8bc8da6a59cb22e903da97926288de788f9f87384de2279bd564b10c5c4651fd56491110adbb23
-
SSDEEP
768:JKe7zUTWVlTVV0uIaOoRPmTPsED3VK2+ZtyOjgO4r9vFAg2rqB47KI62tQO:JKe7zUm9FIaOHYTjipvF2SIVKO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe -
Executes dropped EXE 1 IoCs
pid Process 4184 codecupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language codecupdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2272 wrote to memory of 4184 2272 b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe 84 PID 2272 wrote to memory of 4184 2272 b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe 84 PID 2272 wrote to memory of 4184 2272 b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe"C:\Users\Admin\AppData\Local\Temp\b2733fa637076db3266c3ceb1a3e6b98636a1c3d6dad2e3a61788a2b7774a4bdN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\codecupdate.exe"C:\Users\Admin\AppData\Local\Temp\codecupdate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD56909749db9efd18444546e4d8d701cad
SHA19e177aa3b66cce5aca0677ed4063860d60b1b473
SHA256d966eb3ea3868bf342de288d79903424829b2d5754d8ac3975311fb8c6e447db
SHA512c44bad7c68b6c2b8af48a95a50d348cae0d69e8e381ce1c521f9a5e073869b25a04aca089b7ee1604edea8bae32c3b70e86cbb8e688d6d707c47f7f796fa3504