Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe
Resource
win10v2004-20241007-en
General
-
Target
0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe
-
Size
15KB
-
MD5
5bd67957a7626b7533f521f54efcb071
-
SHA1
7e5858959534e892d3dc56ce8a08548b6b9eda9f
-
SHA256
0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26
-
SHA512
c735ad2d292a4bcb5043977d952b435c05010a53451a6d7e2bfc86b664dae44a1ff585af51ba2f8ea627d230661dbf1c443486e1e7fbbcabd9d75a751ef30e13
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYq445:hDXWipuE+K3/SSHgxmq445
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DEM70AC.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DEMC9C8.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DEM20D1.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DEM7848.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe -
Executes dropped EXE 5 IoCs
pid Process 4020 DEM70AC.exe 2560 DEMC9C8.exe 648 DEM20D1.exe 1468 DEM7848.exe 4728 DEMCF42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM70AC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC9C8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM20D1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM7848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMCF42.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4020 3588 0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe 90 PID 3588 wrote to memory of 4020 3588 0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe 90 PID 3588 wrote to memory of 4020 3588 0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe 90 PID 4020 wrote to memory of 2560 4020 DEM70AC.exe 94 PID 4020 wrote to memory of 2560 4020 DEM70AC.exe 94 PID 4020 wrote to memory of 2560 4020 DEM70AC.exe 94 PID 2560 wrote to memory of 648 2560 DEMC9C8.exe 96 PID 2560 wrote to memory of 648 2560 DEMC9C8.exe 96 PID 2560 wrote to memory of 648 2560 DEMC9C8.exe 96 PID 648 wrote to memory of 1468 648 DEM20D1.exe 98 PID 648 wrote to memory of 1468 648 DEM20D1.exe 98 PID 648 wrote to memory of 1468 648 DEM20D1.exe 98 PID 1468 wrote to memory of 4728 1468 DEM7848.exe 100 PID 1468 wrote to memory of 4728 1468 DEM7848.exe 100 PID 1468 wrote to memory of 4728 1468 DEM7848.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe"C:\Users\Admin\AppData\Local\Temp\0c7bfea65f9b796f57ee415f1778c60fadcb837701e8934cad3a595828ebde26.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\DEM70AC.exe"C:\Users\Admin\AppData\Local\Temp\DEM70AC.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\DEMC9C8.exe"C:\Users\Admin\AppData\Local\Temp\DEMC9C8.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\DEM20D1.exe"C:\Users\Admin\AppData\Local\Temp\DEM20D1.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\DEM7848.exe"C:\Users\Admin\AppData\Local\Temp\DEM7848.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\DEMCF42.exe"C:\Users\Admin\AppData\Local\Temp\DEMCF42.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59bc58d61778d743589e5921083f46144
SHA1370dae7e71f9398c0dedbc3489c4fa8c780e668a
SHA25657a06a496c065243cc97513a017de14167c598838813250c49a184e60fd69600
SHA5120e9535a63112530df5ae579e6ece9efb3ded17ffecf5b524f9971f87a0d44dc89bc0ecd4ec9d3bb8b7e7bac9863a21b52f02eddb9ff29e5ac429dfa0232c922f
-
Filesize
15KB
MD5ac3b7a3649e6de8cc39ea114192e5cfc
SHA126912b05e8b7e9ca87432aee64d2308d222ad573
SHA25618531042beb0b7a9c24812a6e9aa47f43d4071893809885f9de02866434c2513
SHA5121c68c38408c2fca3d446ac2b4fab5185009735c1aa2b58fa336035d5bd9189fc11beb9e407912bbeb7d109897cd88ab42cace25a9d5d45ef91fe1141a46e9d63
-
Filesize
15KB
MD5742e44d046b69085a88a757df1b4789c
SHA107fd7c08d5a6fb07a727cc2b0893658e24add4e1
SHA2560d115d3a32b33c5220f804afbcca40477b54eb6fe2a927d10d71d330b19bd165
SHA5127f8a334448a485222b9134bd537673cd0e0f449f28694ea728116fe1c1e1edf2a5eb6cfb0de8892f80bb22151f51ca2d1fc34c828a3a339310eec1f1f43286da
-
Filesize
15KB
MD555d8ff236326b4fb5dcd1b0d4a80a302
SHA17c9aec4f59d353563586cafdf89e0a589cb1345a
SHA256c43887f70914c38c93581e47dc493cee64db09d3a743383422ee2f4c80b5e363
SHA512bb8f925021d79eadce26a0c89ce8510e249667312bfcfa6fd0b312816fa8192e25f8e553367363b064c746113be873b211d0d0890d47cd9acd923ae7e18bf6d5
-
Filesize
15KB
MD5da92dacd13173917c8491222e98ee117
SHA114df8ad0c6a9d4d70170692a46af62c1d6d30de5
SHA2567879560ab3c67fe675a67c8d34931ca56341551c6323f4f3e6fdd03da676df20
SHA51223609dd88bf0eca894c05bda2858c4c0b2f2c488a6bdb38ec9e195a99a6d2d5ca997e7e2eca938b0fb908c839beea61e59089a7e712fd71106ece11460e0dcb6