Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe
Resource
win10v2004-20241007-en
General
-
Target
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe
-
Size
282KB
-
MD5
40ee20062ea7c34b5f2d6ad500e6f710
-
SHA1
0f6b3a858bc89be0b4fedd133266793576f418e7
-
SHA256
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157
-
SHA512
8b5b81291650218adbd7165a3fe6753ba865c0b6b2f13f6bf700bc87c6b3915ea94afbdc77a5bc447149c2dff88769725b878710b9efe1655b6a59a825ddd391
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfpG:boSeGUA5YZazpXUmZhZ6St
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 436 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exea1punf5t2of.exedescription pid Process procid_target PID 4624 wrote to memory of 436 4624 797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe 86 PID 4624 wrote to memory of 436 4624 797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe 86 PID 4624 wrote to memory of 436 4624 797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe 86 PID 436 wrote to memory of 2156 436 a1punf5t2of.exe 87 PID 436 wrote to memory of 2156 436 a1punf5t2of.exe 87 PID 436 wrote to memory of 2156 436 a1punf5t2of.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe"C:\Users\Admin\AppData\Local\Temp\797b0eea8f8600968dad3e17f112d28e7f5668e3f883e10796d76ecbc36b5157N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2156
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD560bb42fc3f6f05730cabccf9b082fb23
SHA19022fd88231d9541bf3d28801235968616f708f2
SHA2567bb13eff90ae2f34c7e042e7bd7c88114397996a49ba977c8bf65cf3cd9c3188
SHA512b84f9ee20aa248f7ec297cf0aad9325bcaf3fba358ee82c8fab5999c3ed049e8fb9f0c4806b31a67de48de1d2219ae731c455c4836cc8142616277d35de1e932