Analysis
-
max time kernel
102s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe
Resource
win10v2004-20241007-en
General
-
Target
1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe
-
Size
414KB
-
MD5
65f0fff6a9c3e188567a29eaa68df610
-
SHA1
32324f6cdc5b274103bf64d5de6bac913c859063
-
SHA256
1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3e
-
SHA512
4e61e5532dbc12c006490d4db9fc1ca11028c04fca024e5425d1e588c7ce7c133649b4cf18f2f5190d5b2f31dfef24d35e41f304f04f56024c64d928181f70e4
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUK:ITNYrnE3bm/CiejewY5v5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 ximo2ubzn1i.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2248 4964 1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe 91 PID 4964 wrote to memory of 2248 4964 1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe 91 PID 4964 wrote to memory of 2248 4964 1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe 91 PID 2248 wrote to memory of 4392 2248 ximo2ubzn1i.exe 92 PID 2248 wrote to memory of 4392 2248 ximo2ubzn1i.exe 92 PID 2248 wrote to memory of 4392 2248 ximo2ubzn1i.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe"C:\Users\Admin\AppData\Local\Temp\1fc21974c56c5146756cebae45ebf547058ded5d62368dd87ad310444d915b3eN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:4392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD507ddd782e1435b3290328e26fd8d6866
SHA1d892903ca6dd6527109d27fa47096968b0cdd0bd
SHA256ccbfc4f1827b7fdecd9bfd5b7faf49d8a712be9358d03a46063e3b36f0495524
SHA512b5858394a33e18feb955443e4131d0d63a61e117bfc9d1377d5489840197ecdcaa10e26a94336b64e6ae530be70b9d8314a7b2e85d0ab1cc37e1c64fb596fc6e