Analysis
-
max time kernel
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe
Resource
win10v2004-20241007-en
General
-
Target
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe
-
Size
282KB
-
MD5
31c459cd9032a06f69a76a127f351d40
-
SHA1
6514235dec2b484126b8efd4da3552c047b89525
-
SHA256
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cb
-
SHA512
bb5dec7af7c2db4fdbcec36bcb9168f1c11d8698d059ceb625da409e1abd7fde031ea1fbd3c71ff0cb3ed54c0fb590b357d9140d1ae5e05e489075a300c0ee63
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkf9:boSeGUA5YZazpXUmZhZ6SY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 2336 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exea1punf5t2of.exedescription pid Process procid_target PID 2396 wrote to memory of 2336 2396 6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe 85 PID 2396 wrote to memory of 2336 2396 6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe 85 PID 2396 wrote to memory of 2336 2396 6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe 85 PID 2336 wrote to memory of 4768 2336 a1punf5t2of.exe 86 PID 2336 wrote to memory of 4768 2336 a1punf5t2of.exe 86 PID 2336 wrote to memory of 4768 2336 a1punf5t2of.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe"C:\Users\Admin\AppData\Local\Temp\6d409ccff3c4145e6fce47d03e62da2af17d8e8b90278b7a974d9a14f1a382cbN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD56a462ce1416b675842b45317895ce379
SHA1d03d505dbb5ef5b7452bc25d3330396bec23dbbe
SHA256253ed1cd99295d0cc260b7f78c19d271448e80b93801996a40f5e37a5c0ee2ad
SHA512cb0073914df65e2815d9430d59672fd1f24c2e8ba922eeead4852567c62bb7dca19e6904c1a9378e3ea74ce527a4d2e95935e001d6c4c41e20325d8c94fd6a1b