Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe
Resource
win10v2004-20241007-en
General
-
Target
78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe
-
Size
16KB
-
MD5
c42a72e0db74abe1ae634448070f2981
-
SHA1
bd556100517aacfb22c40fedc76c58238b5bba84
-
SHA256
78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a
-
SHA512
7891252324a1ffeb5f9316e2de89f0b1f151ce610fb4837ee441965c4277da1e94d412c0a7e18c680c5d933480dff1baacd9ff79b409e55d170a2f61ec849d0e
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4Yhv5JT9:hDXWipuE+K3/SSHgxl5p9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEMB5BE.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEMB20A.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM8E4.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM5F71.exe -
Executes dropped EXE 5 IoCs
pid Process 2648 DEMB20A.exe 1812 DEM8E4.exe 1768 DEM5F71.exe 1012 DEMB5BE.exe 2212 DEMC1C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB5BE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC1C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB20A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM8E4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM5F71.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3412 wrote to memory of 2648 3412 78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe 96 PID 3412 wrote to memory of 2648 3412 78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe 96 PID 3412 wrote to memory of 2648 3412 78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe 96 PID 2648 wrote to memory of 1812 2648 DEMB20A.exe 101 PID 2648 wrote to memory of 1812 2648 DEMB20A.exe 101 PID 2648 wrote to memory of 1812 2648 DEMB20A.exe 101 PID 1812 wrote to memory of 1768 1812 DEM8E4.exe 104 PID 1812 wrote to memory of 1768 1812 DEM8E4.exe 104 PID 1812 wrote to memory of 1768 1812 DEM8E4.exe 104 PID 1768 wrote to memory of 1012 1768 DEM5F71.exe 106 PID 1768 wrote to memory of 1012 1768 DEM5F71.exe 106 PID 1768 wrote to memory of 1012 1768 DEM5F71.exe 106 PID 1012 wrote to memory of 2212 1012 DEMB5BE.exe 108 PID 1012 wrote to memory of 2212 1012 DEMB5BE.exe 108 PID 1012 wrote to memory of 2212 1012 DEMB5BE.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe"C:\Users\Admin\AppData\Local\Temp\78968a49536e19527370a8bb6e2aecd31b20f4f31734b9e163f93077b61a695a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\DEMB20A.exe"C:\Users\Admin\AppData\Local\Temp\DEMB20A.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\DEM8E4.exe"C:\Users\Admin\AppData\Local\Temp\DEM8E4.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\DEM5F71.exe"C:\Users\Admin\AppData\Local\Temp\DEM5F71.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\DEMB5BE.exe"C:\Users\Admin\AppData\Local\Temp\DEMB5BE.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\DEMC1C.exe"C:\Users\Admin\AppData\Local\Temp\DEMC1C.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2212
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5e7be427f136a8a7a45432ff605c70945
SHA1d6748f09249cd0b17928e60381e3a7ecc1939af3
SHA256998c2d2e07c132a7aa6be4ea5c2189f2f438434fde9761d9c2efa3ec4545c346
SHA51225d27df834dbd590dc0806be97ad6f9db09e328bbe377c08d70e4284c61a3bfcfed16e12fafde801e9b57c196e857017119b86f2f3a58b310e3565f3999acd4e
-
Filesize
16KB
MD51ea93871404c9abd1d5a34f602cfc089
SHA11b629737696e9dba052daf5ca0c2c7f9bcb8a060
SHA2567f9f3add793fe11c35848ee4c3c4bfda7256dce18d01719bee3933d11bb6b7c5
SHA512818467356c7989ed1e3964bc48242906045c31776151cb77365cea121e2fb0b0a33db96a70e9ca3b140c51376bb01579ba7a8bfbff338ed056fee07bf340f741
-
Filesize
16KB
MD5b44b3b888fbb08e888e1ef2ce10e0480
SHA1be16d765585ae3b3f264be764e16f86912f22628
SHA256c9749bb8a1601a126481d5b708c6b1f327ecb7effe2069c59ab5ed54b6a97762
SHA512787bf047f8ed6e3142dd2243a523a780a5ec7fe252806d57e3d99a1ecdd2ca175bd3c75fe5b50d34d92b80dd62941e17f43eb6c39d247f0504a38e5ba57d59c8
-
Filesize
16KB
MD54242966c7503175d3e2edfdb53f6dcec
SHA15000c36ed4b225507260b6598883bb22533c23fc
SHA256343db298093ffc87dec1bb3ee2344d85c067e52429ab39e3afeb9b7c475ae93d
SHA5120a85086311a7980e1c287d2ce47a313bb0292c9a253375e57df0cf13c3e9a450be75fc9db53ca09790132e6e80f25232df61d1cafcf3fd6fe56c13f86571bca4
-
Filesize
16KB
MD5f03ee82859f13deb17878f218e833af2
SHA14b7abb129c4e5550f948444aa06430fef306f938
SHA256b191e16c9f5c92d06a787c0b89dcb4beb15eb70ab4635b411edcf9ad9e1a4a0f
SHA512367222d6893da8f78ea00ce5e999713d39f5b93a852229cd631cf571db93b3ed31545ba9a089bb600ed71489a69c9d0bfac50641d2d476d3eb362235e4583645