Analysis
-
max time kernel
113s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe
Resource
win10v2004-20241007-en
General
-
Target
d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe
-
Size
20KB
-
MD5
f3497e254a2cb34d41a3a4087f83fdf6
-
SHA1
aa2b4520585035e92c75123f34cd6c3951972598
-
SHA256
d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660
-
SHA512
55df30db83dd18060882ede8b14c7ca6c994a600028cc328e82524ba984fb1fd401701f3ce86b57d985e73c82c05e8b2471089df58461a3b4f897db2e386ed2d
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMx+L4PRSU:hDXWipuE+K3/SSHgxmHZPRP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation DEMA037.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation DEMF8C7.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation DEM5119.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation DEMA92C.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe -
Executes dropped EXE 5 IoCs
pid Process 3480 DEMA037.exe 3628 DEMF8C7.exe 2460 DEM5119.exe 1960 DEMA92C.exe 1448 DEM83.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMF8C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM5119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMA92C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMA037.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1964 wrote to memory of 3480 1964 d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe 90 PID 1964 wrote to memory of 3480 1964 d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe 90 PID 1964 wrote to memory of 3480 1964 d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe 90 PID 3480 wrote to memory of 3628 3480 DEMA037.exe 94 PID 3480 wrote to memory of 3628 3480 DEMA037.exe 94 PID 3480 wrote to memory of 3628 3480 DEMA037.exe 94 PID 3628 wrote to memory of 2460 3628 DEMF8C7.exe 96 PID 3628 wrote to memory of 2460 3628 DEMF8C7.exe 96 PID 3628 wrote to memory of 2460 3628 DEMF8C7.exe 96 PID 2460 wrote to memory of 1960 2460 DEM5119.exe 98 PID 2460 wrote to memory of 1960 2460 DEM5119.exe 98 PID 2460 wrote to memory of 1960 2460 DEM5119.exe 98 PID 1960 wrote to memory of 1448 1960 DEMA92C.exe 100 PID 1960 wrote to memory of 1448 1960 DEMA92C.exe 100 PID 1960 wrote to memory of 1448 1960 DEMA92C.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe"C:\Users\Admin\AppData\Local\Temp\d6e0d438a933701d926fbd2f16888ebdb2211da86db20e06124d932319c75660.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\DEMA037.exe"C:\Users\Admin\AppData\Local\Temp\DEMA037.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\DEMF8C7.exe"C:\Users\Admin\AppData\Local\Temp\DEMF8C7.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\DEM5119.exe"C:\Users\Admin\AppData\Local\Temp\DEM5119.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\DEMA92C.exe"C:\Users\Admin\AppData\Local\Temp\DEMA92C.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\DEM83.exe"C:\Users\Admin\AppData\Local\Temp\DEM83.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD53282466719cf543024c22ef020eba0af
SHA151d9f9b1dc4d63e3885dfd35ca17ac5eba4c9a74
SHA256ebbd44274ca6c44983fed3aa055ce4d1b15d3dd216d63f7d9e783daaf0e80abf
SHA512991c00f7ce4e53a359191ce889fbf8d153fee549065cec58cc9b77dd62ac938354633521aee9f6b0260c69be46291a5ef060d2dfe2bf5e23fa7cb1d7d290a07c
-
Filesize
20KB
MD50f62e239ea953dce59ab3d76fbe22397
SHA11a013edd10a5f3708e01d17c369e20f9c92262e5
SHA256f425db54b95e6960e599d12297ce16ae26823e62adba6583354d1132cada4ce9
SHA512da1729237678f22e7a8af14accd377c76c6f9649268b9b92d064d43e117c64806b1099a3c1ba49cc36fb435af8627c6018902b7c7072b0a41801c2c4dc24c80a
-
Filesize
20KB
MD52ab2066d636f80ae2a673e462c3c220e
SHA19427d005491d0ea1ae620c50225c0995583b9c9f
SHA2569608677716ce3afb1282c166482ca2074b8160e3e33086aa6283e12155dbb2f8
SHA512c91c90e8b7f540d787a3337eb8a364cd0b0e9cb704c8a49534f91ab5427c7450cdd1b2e5bed3a10aea530891a14d97003a25bad6d2c57226fb6d03409fca53b1
-
Filesize
20KB
MD51e43bd008abcdbf7a5031d891ea833f2
SHA15063310d1242f16045d51d949f7f9112a5145063
SHA2564efd60352a76594c5de0ee5521f8476762aae2f71010aa8e7fbc33ef3783d2a7
SHA512879d2337b926ca6dbd0e4bd33b693e5e26d2a5eb26facbeeb8fbe04e39ab787dd974e22325c0f3af833f948bece602739d9784fb0c6441813a21186732a0edf0
-
Filesize
20KB
MD5434f1487463fda1f5374814f1d1f3dce
SHA13fafb43857b3b5b7c8413193d09346a932e2621d
SHA256cba592e741d33ac04face3a391e11681daa685ead46849be530ed501e83df18d
SHA5127706f518267f5c02234d518958b66abe2d08ada3def0e7031eb4d93e2455fa8471da0561d4099bc7601e6eeba63e25443a5a7e3183db97b3322ef54d141c9454