Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe
Resource
win10v2004-20241007-en
General
-
Target
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe
-
Size
255KB
-
MD5
788694b7baa26fb737137e7269716a0c
-
SHA1
28d2a6a371d2a6a97bb805aa6c4fc42b5218333f
-
SHA256
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057
-
SHA512
e037c1377607ce487fb83cd6dabaec5548398c3fb14d7d503e8b4b03fef94c1f74c7f8d778549a43e0ce6390078f205480ed48e2df8271a48caaab67f9e60992
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQqW:EeGUA5YZazpXUmZhJW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid process 1404 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exea1punf5t2of.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exea1punf5t2of.exedescription pid process target process PID 4612 wrote to memory of 1404 4612 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe a1punf5t2of.exe PID 4612 wrote to memory of 1404 4612 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe a1punf5t2of.exe PID 4612 wrote to memory of 1404 4612 87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe a1punf5t2of.exe PID 1404 wrote to memory of 4856 1404 a1punf5t2of.exe a1punf5t2of.exe PID 1404 wrote to memory of 4856 1404 a1punf5t2of.exe a1punf5t2of.exe PID 1404 wrote to memory of 4856 1404 a1punf5t2of.exe a1punf5t2of.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe"C:\Users\Admin\AppData\Local\Temp\87116c9c8b3896216d763178a26277ed5ce162217141f7f6025063392d932057.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5e7edd0763f377edaa95a504adc6b42fb
SHA13b6234b9cea33f1c0287d994a230a283a652d69d
SHA256d04a9b88c33a40703864436003f2fd985cb1be641560c005b6660103f41eb030
SHA512e4d7e2b505f9fc4bfb62edd9186aee74fe86637e0bf4c14cf63a8033a5ed93903c1687207836b15bce0300202a5894df6fd079f6de21f51c3d30e7f60ec87307