Analysis
-
max time kernel
41s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe
Resource
win10v2004-20241007-en
General
-
Target
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe
-
Size
282KB
-
MD5
1da9a177d2587aadd15b9ea8ff5ec254
-
SHA1
0abe8ddef7a934684e2a99596bdd874268f5dc93
-
SHA256
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9
-
SHA512
3c5f011785f9aac11b8254691d24ec9b99804f6f1672361d105bea5282f3bde7f018da1886cb2306073cb38e0a2a56a2d787e5c8664e4081873c5648cf7513fd
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfB:boSeGUA5YZazpXUmZhZ6Sg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 1260 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exea1punf5t2of.exedescription pid Process procid_target PID 4916 wrote to memory of 1260 4916 a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe 86 PID 4916 wrote to memory of 1260 4916 a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe 86 PID 4916 wrote to memory of 1260 4916 a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe 86 PID 1260 wrote to memory of 3216 1260 a1punf5t2of.exe 87 PID 1260 wrote to memory of 3216 1260 a1punf5t2of.exe 87 PID 1260 wrote to memory of 3216 1260 a1punf5t2of.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe"C:\Users\Admin\AppData\Local\Temp\a0b9c711a659f3f7ea8f4d0a7599247272e83613310969c465e930ddbe9114d9.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:3216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5a5eae2c1c60b84504f78f4b680c4ce0e
SHA18f8ae4db22d4897d3bc1dbc46a83fe990787126f
SHA2564ed2998b84ec01c6810656722ae23fc5e6fac338a9b875c98c0a1102d89dfe40
SHA5122293acd65b9f83a6ab7bf1af5639b7e3058e0a1ba3f8bff547884ec9a30e6df5e1874fd3b1e48df45ed9f195ac8ba3eb35c0bd1d05885bdf81c146cb25385f8f