Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe
Resource
win10v2004-20241007-en
General
-
Target
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe
-
Size
415KB
-
MD5
ea1cf232a4bad711276174692234aab2
-
SHA1
fba44c2496392a43c7ca77ac67ef1d83aae7b695
-
SHA256
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936
-
SHA512
8a982c16646427a93488a20bccf90b7b71dac284ad69c4369932755291288ea65a29069c25bcb4536692a2916631ad81cccaddc6c06971a40f5336edbd1316da
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7g:ITNYrnE3bm/CiejewY5v/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe -
Executes dropped EXE 1 IoCs
Processes:
ximo2ubzn1i.exepid Process 876 ximo2ubzn1i.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exeximo2ubzn1i.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exeximo2ubzn1i.exedescription pid Process procid_target PID 2440 wrote to memory of 876 2440 953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe 86 PID 2440 wrote to memory of 876 2440 953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe 86 PID 2440 wrote to memory of 876 2440 953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe 86 PID 876 wrote to memory of 2064 876 ximo2ubzn1i.exe 87 PID 876 wrote to memory of 2064 876 ximo2ubzn1i.exe 87 PID 876 wrote to memory of 2064 876 ximo2ubzn1i.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe"C:\Users\Admin\AppData\Local\Temp\953d5ceb163cd52ce049e4f120a30e60464144a312d892abf81f03fbc75b9936.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD5c06997057e998a6ffbe854a8137c86b3
SHA1653e7ee37c757f51a3146d1a2e0821f853b55bd8
SHA256f717c14f642c6ebbae0192517bd5f0db41f9b5f5f75e968a32a0b98ad95512cc
SHA51205e05bcbf615fddc56ebea7f4800139aaf0efb026acf8ca836add6370d97da8e51dc263aaee473df05de6ba58419a60063b2145c1f776617875ee1a734fa0af5