Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 23:07
Behavioral task
behavioral1
Sample
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
Resource
win10v2004-20241007-en
General
-
Target
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
-
Size
481KB
-
MD5
a7ee819bfb900ad6d20ebe4d1da8af4c
-
SHA1
b50f78b7447b040f57d115c70c5fb4e62cac70f3
-
SHA256
b6331431d23acf4528527316a993890117bac208c604b054622efee21cbffcf5
-
SHA512
2683efbd00d03bc838e65b8bcc0640faabfbc63e9055b5b81aa42f338b25cf5998271df877fdf5f8fe4a13a0f3d93cdbf0ae71261753333702a79a824f5685e8
-
SSDEEP
12288:3uD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDST+DY:q09AfNIEYsunZvZ19ZAs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 3064 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
WScript.exe1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe -
Modifies registry class 1 IoCs
Processes:
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exepid process 2108 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exedescription pid process target process PID 2108 wrote to memory of 3064 2108 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe WScript.exe PID 2108 wrote to memory of 3064 2108 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe WScript.exe PID 2108 wrote to memory of 3064 2108 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\amdzzcia.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD50270a6efd1cd19379f8c83a778d4f31a
SHA16826bc7b7d65a4ccbaae04065039b4485ab4b56a
SHA256549d6ce82df6c229fe2bdf60fa16b3d113b7041bd8c498dd62cc5dc174fbed50
SHA51245cbd115dbc79806f415c5341d2098d44d1de1bca51366dc243ed375a9da9e9bd3ce63d83043a36b723b3790b99013852ac1ca4d747786b10130a2e7b1ed4499
-
Filesize
828B
MD5fd4d288901413e8d992e3382e6a80e00
SHA1df54ad1fda8372c8b3a5273203b3ec9a8e0107a0
SHA2567610f747ba60dd471083b15d25eb6321c3983836bbe390e4c197124a6f243b90
SHA512e556e74fc662eebb496eeac1ebee4e3c7af089ae2743905ba66841f72f28a3f95327a23af47f7d3c1b334af41fb49f819589ccb0195aa8f409d8e67bf20b6163