Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 04:55
Static task
static1
Behavioral task
behavioral1
Sample
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe
Resource
win10v2004-20241007-en
General
-
Target
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe
-
Size
254KB
-
MD5
ac44a581840726435486ba9533062c1c
-
SHA1
844193c83883c8477baddfb2b9980bf9830ba5b7
-
SHA256
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e
-
SHA512
8cbdc08b92a8ebecd9d0ff646d81b41cc62732863e87152097f2720f12ce21a03039d8ffe6755cf148ddb37d59dc7e57840e285802fd117b2f8ce998793f8cff
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQpW:EeGUA5YZazpXUmZhiW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 1692 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exea1punf5t2of.exedescription pid Process procid_target PID 348 wrote to memory of 1692 348 d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe 100 PID 348 wrote to memory of 1692 348 d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe 100 PID 348 wrote to memory of 1692 348 d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe 100 PID 1692 wrote to memory of 3016 1692 a1punf5t2of.exe 101 PID 1692 wrote to memory of 3016 1692 a1punf5t2of.exe 101 PID 1692 wrote to memory of 3016 1692 a1punf5t2of.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe"C:\Users\Admin\AppData\Local\Temp\d74c11bb7581f8340ecc093c08ef0d83a72ae86003e20e703791033fcf29f32e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD56d94e41149ef6630c39b0506f14752c7
SHA1df8d6629071b7bd6395bf3236a7582250a2c7f98
SHA25637ffc9efeaa0e04338d4a99a7d5e0e40a2a53deb3377ce00582c02ed8a6e899a
SHA512d6f0b16795637b6e46d8c40bd25733c2ddc4773122c28a792bcb58a44a358e3684891ec44e81a6970a94dfdb1dfff438d0ee517fbe0b25e1fc210573566796fa