Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe
Resource
win10v2004-20241007-en
General
-
Target
4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe
-
Size
281KB
-
MD5
902f329132d38b6ab6a8cd38cc59a493
-
SHA1
94462ef8f247e98259c8b7b08ea76dac2f94e701
-
SHA256
4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740
-
SHA512
4faeb3f2375692ea1f74ecd844cf9b7ba46cbc9611fbe64ab5f804b783a277e63fab197e1ba0a5b52550c61bf6829bfa2f180e3c7422f7b0946fc38e3b3d5746
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfi:boSeGUA5YZazpXUmZhZ6S/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe -
Executes dropped EXE 1 IoCs
pid Process 1848 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4992 wrote to memory of 1848 4992 4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe 100 PID 4992 wrote to memory of 1848 4992 4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe 100 PID 4992 wrote to memory of 1848 4992 4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe 100 PID 1848 wrote to memory of 2260 1848 a1punf5t2of.exe 101 PID 1848 wrote to memory of 2260 1848 a1punf5t2of.exe 101 PID 1848 wrote to memory of 2260 1848 a1punf5t2of.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe"C:\Users\Admin\AppData\Local\Temp\4e63dde927cbcf9398224adc3a3d1b5407f92fef63bb1daecb7e1f46b2dc6740.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD55fdde3fc6d54aff7748bc4d13a2a3fb3
SHA1454d0fc46538e7feaa049df9ceddbc16e376e647
SHA256c9386319d9d66fedd4fbeff61f69ce92713bf84d74628d3028edad2add31fbc3
SHA512f66030ae8b507f19da9ae5561958361989784cca744c3339817bfb2d05d0c701607e191cb008798c0029419cd992e7c5906c1cb134fb92c40a339bb15abcba93