Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe
Resource
win10v2004-20241007-en
General
-
Target
a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe
-
Size
254KB
-
MD5
b1d091fcc52ea1414e9ff79ee5c7801a
-
SHA1
6dab4c38bf631e201d4134824a034570b2ae88bc
-
SHA256
a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718
-
SHA512
9d1f31f8c3f821e3376d95925216537bec0888312c9f711d5ed9d47efee9a82a96bb4561458b1db151e91610bf0ae525ad53794038e3ea5a0768f57e0b48613c
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ1E:EeGUA5YZazpXUmZhmE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe -
Executes dropped EXE 1 IoCs
pid Process 4348 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4348 1520 a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe 98 PID 1520 wrote to memory of 4348 1520 a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe 98 PID 1520 wrote to memory of 4348 1520 a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe 98 PID 4348 wrote to memory of 4248 4348 a1punf5t2of.exe 99 PID 4348 wrote to memory of 4248 4348 a1punf5t2of.exe 99 PID 4348 wrote to memory of 4248 4348 a1punf5t2of.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe"C:\Users\Admin\AppData\Local\Temp\a4763320a093f7e11e4ecdcc45a813938a7fc27213f4769c3d70bed84af5d718.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5e9c30ca781935af7f24329b950b80c78
SHA11b409fdd02b135bab2d1182e206c00afe6dcdb4b
SHA256d68bbc13665e2a29fea1433b829c824bc8f22922de755ff03e2e840cba8cdae9
SHA51262ca3ad77637acf0412b2753f73fd6ef4f02e45dc32934d505a3cb23a22fbdfe91fa4368b3874afb6c4e0b66e3830647420c9fe921621b6f13034f9a71234ae5