Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe
Resource
win10v2004-20241007-en
General
-
Target
38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe
-
Size
255KB
-
MD5
0f145b0ea82bf9216e1ea1c50f519130
-
SHA1
656201fdbcfe1f0ef23f59411c4878fd2b4072a0
-
SHA256
38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bba
-
SHA512
f9f0e64d632e385f5f8fe71369a995499c037faa1e20a43b9cecaf07a5a13beb920ccdb9e9674f334ed18b315f050f42d4797f4185574a1194901a0c710c21fe
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQqW:EeGUA5YZazpXUmZhJW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe -
Executes dropped EXE 1 IoCs
pid Process 3792 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4780 wrote to memory of 3792 4780 38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe 93 PID 4780 wrote to memory of 3792 4780 38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe 93 PID 4780 wrote to memory of 3792 4780 38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe 93 PID 3792 wrote to memory of 1104 3792 a1punf5t2of.exe 94 PID 3792 wrote to memory of 1104 3792 a1punf5t2of.exe 94 PID 3792 wrote to memory of 1104 3792 a1punf5t2of.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe"C:\Users\Admin\AppData\Local\Temp\38b8eb4f83b1e90951ebb7d5b7001b155bf08ed5236d3f12d5e5d88f8baf3bbaN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:1104
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5a4457d5f96aed5f8aa0fdf52ed31dbf7
SHA158e41e17fc538f5f8d151b954beb7f2dda674080
SHA256fc6418c9a9892aad125ff63977121f7612aee30e1b0c8f970bc0a9009162b8a9
SHA5129583096e66edc2ca9bc15ad310aa061a2ee461f0008efac99e1d0489a097c5bcaec2e2e057e0cb459e76eb7d3d4706ac43b4fcd3ec1190d08abf4bf750d5d288