Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe
Resource
win10v2004-20241007-en
General
-
Target
fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe
-
Size
48KB
-
MD5
5f2abd14d07f2d5ffb25f5330d8c6cf0
-
SHA1
2f43afbdb87cd7385313eeb3e5db9ceaa7a789bc
-
SHA256
fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3
-
SHA512
f76c1eb1b5c4aededcccfc66b467f5a32e77ce562314b9fd440d91b24d0ff8178b7f25e15de060ef32f3774dd6918eba6cdaa218ea8f32c62c5d3023175ee34e
-
SSDEEP
768:f+fAQqud1lKAKmy5ne+9lWNNnLyLpIgAXhT:fMdvBKmy5e+H8nedIgAxT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe -
Executes dropped EXE 1 IoCs
pid Process 4692 pytcw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pytcw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 864 wrote to memory of 4692 864 fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe 83 PID 864 wrote to memory of 4692 864 fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe 83 PID 864 wrote to memory of 4692 864 fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe"C:\Users\Admin\AppData\Local\Temp\fc1c407d59b013edf2841519c491414169b4ea779159b988e383ef7b1660f5d3N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\pytcw.exe"C:\Users\Admin\AppData\Local\Temp\pytcw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD544295cf3d703e50d0a7b190920cfe5ce
SHA1fb95ffc723056dbc590ff9fe5f9ea542b1625720
SHA256a4f56398ac505005ddc09da7b53ce7864ba1ca8bc6d4a6fdcfd08a359c1ee3cd
SHA5127755030b51db5d1cffbf11ab531144eb14a72910522c2192bdb49769bc7267e89fe1adeb0f364406035c8a558ed6a2b5c012416b1e927a72328ad0a1f601fd35