Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe
Resource
win10v2004-20241007-en
General
-
Target
2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe
-
Size
282KB
-
MD5
14f6b00161ba014980c46e816514f412
-
SHA1
eabaac07246410f41c204f5d23b8c37e3c292749
-
SHA256
2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1
-
SHA512
67b0256a921e70e198b5a51610ab444b6bfbf4ba434aa4ffce4cb32c257dcbfcbf4051c2589f6ebbfd85a25afc05a7ec1dad29611a41a2c1902a1ec6d28bbda0
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfp:boSeGUA5YZazpXUmZhZ6Sk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe -
Executes dropped EXE 1 IoCs
pid Process 1324 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 804 wrote to memory of 1324 804 2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe 100 PID 804 wrote to memory of 1324 804 2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe 100 PID 804 wrote to memory of 1324 804 2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe 100 PID 1324 wrote to memory of 4336 1324 a1punf5t2of.exe 101 PID 1324 wrote to memory of 4336 1324 a1punf5t2of.exe 101 PID 1324 wrote to memory of 4336 1324 a1punf5t2of.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe"C:\Users\Admin\AppData\Local\Temp\2e6958abfe264405fb1621cca6dfef6835248a5dff778d63895d29763a1652e1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5dca7f60d776b62b58d124afdf50280d0
SHA102c50f5284cb48bddf36ccdb74e495d64122ae6a
SHA25672284ba3a25cc325e3439b6fd4a433ec1582df6f99ef5d97a72c3a12d7023d29
SHA5122794ec7af7802a1798a2d66698c3b380cfb2eed144afc7eb83f77a39bad238a282056f79c27c1fb2a2446b2e5a595bdd7510864f2cc2e21f88556265028368da