Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe
Resource
win10v2004-20241007-en
General
-
Target
809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe
-
Size
254KB
-
MD5
af840bf7087a2aaa451b68c10ee560e1
-
SHA1
74ef15993bda96caddc3ea429618b14b54bbc389
-
SHA256
809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d
-
SHA512
c9b8a183e8e1f8f796dd159c565df4405f5c8eb5f4ed0eb7dfd635bae2303d9ba3c95cdcd1ecfe286a748b316d342aff120364836067586be179512cfcbfd2aa
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQq3:EeGUA5YZazpXUmZhJ3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe -
Executes dropped EXE 1 IoCs
pid Process 5048 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4292 wrote to memory of 5048 4292 809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe 100 PID 4292 wrote to memory of 5048 4292 809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe 100 PID 4292 wrote to memory of 5048 4292 809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe 100 PID 5048 wrote to memory of 3060 5048 a1punf5t2of.exe 101 PID 5048 wrote to memory of 3060 5048 a1punf5t2of.exe 101 PID 5048 wrote to memory of 3060 5048 a1punf5t2of.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe"C:\Users\Admin\AppData\Local\Temp\809e534d052cf7fef7f16c1032b3bea866a2ce7dce89cb55a5c143456b31419d.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5a0fa87bd2a057b199574e78a618f7ce5
SHA1dd7be46d7a2741b778273a606f6d1b5007791d4c
SHA2565bd31dba31a30a82858b9390dfd4c259bcb8095622c68fbca627b8f7c814c91f
SHA512bc883225d6eadf5e8122abf686d204438ce45e5a36b664b06c72db90649edd2b60011f6ee6785d590845772b4311276b7da8e03892f52aafd07a0097672e0632