Analysis
-
max time kernel
41s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe
Resource
win10v2004-20241007-en
General
-
Target
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe
-
Size
413KB
-
MD5
f6e706433a6888d324b6f82269f8b95e
-
SHA1
0f39353919b1e8462d7b111b3724529def488923
-
SHA256
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b
-
SHA512
cebabd9848668d85516e9c7f32bad0deb145a314572f9a18b1b46d7f6c4c54354de942cfb550ff2f84141d160bcdcf9805af8f5b91cd78546d3420ce226221da
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUr:ITNYrnE3bm/CiejewY5vQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe -
Executes dropped EXE 1 IoCs
Processes:
ximo2ubzn1i.exepid Process 1960 ximo2ubzn1i.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exeximo2ubzn1i.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exeximo2ubzn1i.exedescription pid Process procid_target PID 3660 wrote to memory of 1960 3660 17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe 86 PID 3660 wrote to memory of 1960 3660 17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe 86 PID 3660 wrote to memory of 1960 3660 17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe 86 PID 1960 wrote to memory of 2816 1960 ximo2ubzn1i.exe 87 PID 1960 wrote to memory of 2816 1960 ximo2ubzn1i.exe 87 PID 1960 wrote to memory of 2816 1960 ximo2ubzn1i.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe"C:\Users\Admin\AppData\Local\Temp\17ab77e714b639382bd95d6cad5252c4ec25224c66ca53a7ba3453a4e6a3c09b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5c1a10f16865ac4817b8f08180ff83678
SHA1905f00069ebef4eb0d8de0c51a5795ffc21616f1
SHA256ad6d911d0e26b799402919154200086194cdfdbeb9df2caab538023057208ace
SHA5123ae2a3ed0d6211a3136238dd4819461281964c3eb1dad32e73348e62938bf7112d4d764e76f780ce7c5a61e8b2b17763807d867c78dafd17411bd00d4b2a6e90