Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe
Resource
win10v2004-20241007-en
General
-
Target
fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe
-
Size
255KB
-
MD5
2dde1f5597487da67e8b2c503998bb07
-
SHA1
32cf050fafd9ebce574e944d9b0afa27b46aa00d
-
SHA256
fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e
-
SHA512
b9818ddfe9dcc87d538c3768985b36eb7bf13ecfa18ed8fdb95ce7d98c27e8615309b74fb479d7ca307552f1249498f5937d93302bbb9e1894c2498631482e7f
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQSu:EeGUA5YZazpXUmZh9u
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid process 2764 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a1punf5t2of.exefec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exea1punf5t2of.exedescription pid process target process PID 752 wrote to memory of 2764 752 fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe a1punf5t2of.exe PID 752 wrote to memory of 2764 752 fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe a1punf5t2of.exe PID 752 wrote to memory of 2764 752 fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe a1punf5t2of.exe PID 2764 wrote to memory of 4892 2764 a1punf5t2of.exe a1punf5t2of.exe PID 2764 wrote to memory of 4892 2764 a1punf5t2of.exe a1punf5t2of.exe PID 2764 wrote to memory of 4892 2764 a1punf5t2of.exe a1punf5t2of.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe"C:\Users\Admin\AppData\Local\Temp\fec3b50d44a1a15ae93ab429bef45c15e7538a5b12857f183a5fc4fd820d7b5e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5814b4158737b1c5addb7a6cd90723a95
SHA199ffa3e90e15624460e40893b28f5422b834efc9
SHA2562715bd709e0c9c9f7a43c29ecd74371630842f8223904652f1c577ddff791de4
SHA512bdb1414bb25b0e2248c9ae915cf0665df777dae0fe624590c9002f87745bae91d88cfe652575b22d8de5f4b05832e8cfa4726bad56df9f7f1130850a3f6de501