Analysis
-
max time kernel
42s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe
Resource
win10v2004-20241007-en
General
-
Target
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe
-
Size
282KB
-
MD5
1f2fa7137a179b847cb83874c8779daf
-
SHA1
63f6a1977b1b4a6b8393c3336499aa90cafdc221
-
SHA256
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c
-
SHA512
e04a568fbe572009db6746f40075599d04dbce0d486eb546ce80d5195225f5cad6987cb1567eb0f34b2517d9aed73c352c56ef5d15e11f526de9a1f56d74fb61
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfp9:boSeGUA5YZazpXUmZhZ6Se
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 4664 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exea1punf5t2of.exedescription pid Process procid_target PID 4816 wrote to memory of 4664 4816 ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe 85 PID 4816 wrote to memory of 4664 4816 ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe 85 PID 4816 wrote to memory of 4664 4816 ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe 85 PID 4664 wrote to memory of 3420 4664 a1punf5t2of.exe 86 PID 4664 wrote to memory of 3420 4664 a1punf5t2of.exe 86 PID 4664 wrote to memory of 3420 4664 a1punf5t2of.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe"C:\Users\Admin\AppData\Local\Temp\ea2a102a0c59bfec24a404070337d82f2f32457339264aea5784291ab11d079c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:3420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5951cc37d5e7ab7db7442b1444e3d4ff2
SHA1498f6f352d4a47f517901cc58e94791c5e25a69c
SHA256ac6216130cba6a39734be5e3f2e3a975151603e0b73c3c64f690e7caaf7e00fc
SHA5128c8d5acc26c2b643ccd8ba0669e299455211e5be659ed3d1cdfefe26500750eaf3b35f62698a7144f6ae6553db26b283ecf04bf902f03099c88b6d27a0ead6ea