Analysis
-
max time kernel
111s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe
Resource
win10v2004-20241007-en
General
-
Target
514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe
-
Size
50KB
-
MD5
7fd5ad7d708480b4a4d76787b3b47690
-
SHA1
95cf7ddad63e87d6d1dd306bc5658977bb215fb1
-
SHA256
514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5
-
SHA512
2f282c9a80f17c90beef4b7d8347babd9e367ea05c2a5ffb415b0227f15ff62c5aefa73185ad9abb56620cdf6f1ca4ef3aa125a110b747bf96b2f35bc0d94d86
-
SSDEEP
1536:4GUiEAJoZWtdEI2MyzNORQtOflIwoHNM2XBFV7WB7lx7+sroMYILSh87vddgc:4GUzRWtdEI2MyzNORQtOflIwoHNM2XBs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe -
Executes dropped EXE 1 IoCs
pid Process 4316 joune.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joune.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 4316 3624 514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe 88 PID 3624 wrote to memory of 4316 3624 514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe 88 PID 3624 wrote to memory of 4316 3624 514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe"C:\Users\Admin\AppData\Local\Temp\514225421165ba6d4769e6d6cf673306536b1eb647419d2ace6c2f8c1d0cc8c5N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\joune.exe"C:\Users\Admin\AppData\Local\Temp\joune.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD58766d233f4b975e5160d947035c1eca7
SHA10410a0a33cdcbf2e5edcba11f2176f83a7c8e3c0
SHA256c0a6f2015cb2dca0e8096c18ddc69b75a4081d394f4790abe033800e0a028490
SHA512501fb01c22f270c690b7b2a8b44f2c287e2e82c75f4f697b934d2720af7ada21322a732b5f9b592ad4d08bd7ee625eedb564b7fc52d11a5076c02a9d17097f6f