Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe
Resource
win10v2004-20241007-en
General
-
Target
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe
-
Size
255KB
-
MD5
788694b7baa26fb737137e7269716a0c
-
SHA1
28d2a6a371d2a6a97bb805aa6c4fc42b5218333f
-
SHA256
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057
-
SHA512
e037c1377607ce487fb83cd6dabaec5548398c3fb14d7d503e8b4b03fef94c1f74c7f8d778549a43e0ce6390078f205480ed48e2df8271a48caaab67f9e60992
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQqW:EeGUA5YZazpXUmZhJW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe -
Executes dropped EXE 1 IoCs
pid Process 1404 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4612 wrote to memory of 1404 4612 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe 98 PID 4612 wrote to memory of 1404 4612 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe 98 PID 4612 wrote to memory of 1404 4612 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe 98 PID 1404 wrote to memory of 4856 1404 a1punf5t2of.exe 99 PID 1404 wrote to memory of 4856 1404 a1punf5t2of.exe 99 PID 1404 wrote to memory of 4856 1404 a1punf5t2of.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe"C:\Users\Admin\AppData\Local\Temp\87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5e7edd0763f377edaa95a504adc6b42fb
SHA13b6234b9cea33f1c0287d994a230a283a652d69d
SHA256d04a9b88c33a40703864436003f2fd985cb1be641560c005b6660103f41eb030
SHA512e4d7e2b505f9fc4bfb62edd9186aee74fe86637e0bf4c14cf63a8033a5ed93903c1687207836b15bce0300202a5894df6fd079f6de21f51c3d30e7f60ec87307