Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe
Resource
win10v2004-20241007-en
General
-
Target
0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe
-
Size
57KB
-
MD5
a58aed5ff9750582aa8853b23a0df7a0
-
SHA1
7bf459446790c14cef9687e9c5e684d147d56cd4
-
SHA256
0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7
-
SHA512
0890b04670c63ac49464c659fe38fcee6a25ad9cc0bf6c7c566de846dca0d366509a258b323fcb741338cb7c0b7f53df203aadd92b17bf518cee76ed23bd6cb8
-
SSDEEP
768:DVGj3/ija+1Ict5YabfTWysKEIU1oTNVXSpMOq/OdeCmOtMZus6l3z9DTpLz2r:DVGQ+aLTW9P1oTSpMOqJClMZn6lZTpLs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vis16.exe 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vis16.exe 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RCX8E75.tmp 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 vis16.exe -
Loads dropped DLL 4 IoCs
pid Process 2556 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe 2556 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe 4808 vis16.exe 4808 vis16.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vis16.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2556 wrote to memory of 4808 2556 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe 86 PID 2556 wrote to memory of 4808 2556 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe 86 PID 2556 wrote to memory of 4808 2556 0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe"C:\Users\Admin\AppData\Local\Temp\0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe"1⤵
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vis16.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vis16.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD50894b066a1be6ad725b211fb26d10214
SHA1f8292953336278c0d145d8de476de4adc38fa49f
SHA256ebea467a68a15885442edb01dd0ede99cf404e4f8462482bb3c36bbd19ddf7f6
SHA5125858ee9bff281786549ec28a6025f003ec7eb8125f8134cbfc9a5e939a61c3222e77ee718604b16be14814615b79b18804dfa0a9452d201437220bf4a9c5c0ab
-
Filesize
57KB
MD5a58aed5ff9750582aa8853b23a0df7a0
SHA17bf459446790c14cef9687e9c5e684d147d56cd4
SHA2560109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7
SHA5120890b04670c63ac49464c659fe38fcee6a25ad9cc0bf6c7c566de846dca0d366509a258b323fcb741338cb7c0b7f53df203aadd92b17bf518cee76ed23bd6cb8
-
Filesize
35KB
MD587613cb96eceb921d2eb6ef2a93edf0c
SHA160c91526815f99080068e7c7ca63204da817475c
SHA2564693920bbdc8370176e8786282216cce32cc2f8852814927bc806d39bc06e9fa
SHA51205b179905d61ec6c30b93acc2b21ff5b9d986cb001f55b5f2c2af59ae7e3e8bab701977713c1286aac0710e8c8a1880727753e7fe77ede0553380d4e0460a7f8