Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe
Resource
win10v2004-20241007-en
General
-
Target
df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe
-
Size
26KB
-
MD5
a93ce4bb65d5290e340efae70b2fb3e0
-
SHA1
9018592f90be1a9d3abd122850c8d332e5ff415a
-
SHA256
df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43
-
SHA512
19eee495c24b11544267a2bba862dbe4420defa608816f6ed6e5d91e766c6ac189f41db2128d8773f0a5b3b8a210d4cb860ce1f70b05df5022f01737c574e17f
-
SSDEEP
384:F3EqGY2HXgrS40Lol5ZLzH4VhvshYpATUgch1A9NB/erxUkoF/Z:F3EqG5H8PuoljH4vEhkgs1lxQFx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 winupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 384 wrote to memory of 5056 384 df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe 85 PID 384 wrote to memory of 5056 384 df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe 85 PID 384 wrote to memory of 5056 384 df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe"C:\Users\Admin\AppData\Local\Temp\df95ced10b5f5d92a3c723b8889599a09fe68b1b3394df82bc6ab5df975fde43N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\winupdate.exe"C:\Users\Admin\AppData\Local\Temp\winupdate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5d8a2554e62a599d1e5a3bc3825e1ee42
SHA1d20cac0c8cb2787ae28b7761bac58afc4f848ad7
SHA256594b17a5554f03ae78ca45d3a48b03d7ad755ab8fb256414339f35c29cdd124d
SHA512cfed59ef40f9be60128c40ec1ba854613a12549a6b50ecfbb58a1fb9256ede7d4a24d10e9174a73e459a00cb0808e7e1602f42dffbd0ed6b4975a6e2b3f519ab