Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2024, 03:15
Behavioral task
behavioral1
Sample
c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe
Resource
win10v2004-20241007-en
General
-
Target
c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe
-
Size
154KB
-
MD5
bbe8e829aee18186412c5aa0a0a53382
-
SHA1
e44472544add419c8ad1fca677cd4cceca18d02c
-
SHA256
c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab
-
SHA512
ae27a93fd3d6f9410621707db4891793f6f6d718589688f0eb5bcc8c758c4bac3b37e07fe4b4cf01ec4c74bf851a3b71b7ed2b7ad89535d2fd38f0090fcc9fdc
-
SSDEEP
3072:Ntbqvi9nMKxQbZ5x66EfACsxfcYvQd2Oep:Nt2vsx+AV4LfLOO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe -
Executes dropped EXE 1 IoCs
pid Process 2624 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1468 wrote to memory of 2624 1468 c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe 88 PID 1468 wrote to memory of 2624 1468 c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe 88 PID 1468 wrote to memory of 2624 1468 c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe 88 PID 1468 wrote to memory of 2264 1468 c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe 89 PID 1468 wrote to memory of 2264 1468 c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe 89 PID 1468 wrote to memory of 2264 1468 c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe"C:\Users\Admin\AppData\Local\Temp\c562276ebb24c6752847dfc97fa16c3d79f0106621c9b0eeda7e8713e222f8ab.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD53abc59376e196dd5f2aaf0891e4ae48e
SHA1b816f5e8c5801a1fe93d9a24eedd6e90ecb2c26d
SHA256d7ba16f5b37f6aab51db11588838b36b5c09198f147894c2c7339603426291e5
SHA5120eac983684f1e910f347ff8c52fda3cc374e2a9920a71afe872d0152f63c1c9e3ad454b474a18f2c589770374a701c6a3d18659d149cb73d467c85ce50b39c38
-
Filesize
512B
MD52930c042c9ee5e07f321f2134a0c7edc
SHA1ee39f41eaf6ce3c8d917a89e65959414ae0088e6
SHA256a328475bbb730da292b83ed6cabbdbfc0616f042296f0c6fa356c5368ffc1309
SHA5122da91d5effc116d8c8661c2a99f1d9c2aaffda0f776551dc7ad1911fdb2765591e5b441b9a1fe0090bcda8ed24d180b563ed2c127676cf1de40001e4b15b5506
-
Filesize
338B
MD5218f1183cea08a87d59f988bb1532733
SHA14689ac14fe87c120737c99d8fd9ca54cd0f867f7
SHA25648ebb3ba1daba58d6a0d2b53bbd5edab42ce9e4041d1cb41bbf48ba267147059
SHA512f81ca8f6913504c15d0368f1eab10f578256d8940de58841216e7062eaf8d03ae13c27d6741c694d2ed9fb815906800eeb7547209500b926922bf6e422a37359