Analysis
-
max time kernel
36s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe
Resource
win10v2004-20241007-en
General
-
Target
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe
-
Size
282KB
-
MD5
d312c103a4331fdbc513603b7cde3be3
-
SHA1
369f521073350ecc7c84c97b388af5139c7b4a49
-
SHA256
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13
-
SHA512
259a5fe87093e17efa6d5adbac2bfd87d41c1ebcbf0e13507f1f2e5629f5ad64826b6286aa2a2357484eb99be915ff9f5e257e2bac44cee37a778a6956ba5ac4
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfMj:boSeGUA5YZazpXUmZhZ6SX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 2120 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exea1punf5t2of.exedescription pid Process procid_target PID 812 wrote to memory of 2120 812 9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe 86 PID 812 wrote to memory of 2120 812 9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe 86 PID 812 wrote to memory of 2120 812 9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe 86 PID 2120 wrote to memory of 5076 2120 a1punf5t2of.exe 87 PID 2120 wrote to memory of 5076 2120 a1punf5t2of.exe 87 PID 2120 wrote to memory of 5076 2120 a1punf5t2of.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe"C:\Users\Admin\AppData\Local\Temp\9c84e7d7ad3822d97d11e5024e506735813690472ff11c818fa949c171424b13.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:5076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD539f958fe6b8f3a0523e66980cb70045e
SHA14a1077b1825060382116a604ccaf981d8a1c5e7a
SHA25611b506bdc631f6cb41096cf295829809f0cf7545de663eac72b617522a7b4bc8
SHA5127018eb13652a9dc0c99c5796ecb1504f7c4e98cde18fa0af3258aceb8d388094434923c6e7597b364dac8f408f428fc12170a3a394ff0a3dbe67235021d70a90