Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe
Resource
win10v2004-20241007-en
General
-
Target
951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe
-
Size
15KB
-
MD5
c19aaa16857dcee1b1926753c561aa50
-
SHA1
ea763ca1ea9dd3b3e4b3697e069a2a8c9073325c
-
SHA256
951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610
-
SHA512
78cf60556b854ee665dd0d728ea8575c5a6c083005a5705831c55b11469a2cd55f558bffac1fcdd0adc7fb1cbb36ae1aa2dcffdfa81a525f670224453afd5f52
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYyh6E:hDXWipuE+K3/SSHgxmyh6E
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEMB8F0.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEMF9B.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEM65BA.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEMBBF8.exe -
Executes dropped EXE 5 IoCs
pid Process 2692 DEMB8F0.exe 1224 DEMF9B.exe 392 DEM65BA.exe 4716 DEMBBF8.exe 3228 DEM1255.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1255.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB8F0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMF9B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM65BA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMBBF8.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2692 1512 951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe 90 PID 1512 wrote to memory of 2692 1512 951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe 90 PID 1512 wrote to memory of 2692 1512 951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe 90 PID 2692 wrote to memory of 1224 2692 DEMB8F0.exe 94 PID 2692 wrote to memory of 1224 2692 DEMB8F0.exe 94 PID 2692 wrote to memory of 1224 2692 DEMB8F0.exe 94 PID 1224 wrote to memory of 392 1224 DEMF9B.exe 96 PID 1224 wrote to memory of 392 1224 DEMF9B.exe 96 PID 1224 wrote to memory of 392 1224 DEMF9B.exe 96 PID 392 wrote to memory of 4716 392 DEM65BA.exe 98 PID 392 wrote to memory of 4716 392 DEM65BA.exe 98 PID 392 wrote to memory of 4716 392 DEM65BA.exe 98 PID 4716 wrote to memory of 3228 4716 DEMBBF8.exe 100 PID 4716 wrote to memory of 3228 4716 DEMBBF8.exe 100 PID 4716 wrote to memory of 3228 4716 DEMBBF8.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe"C:\Users\Admin\AppData\Local\Temp\951c1997be3e152be1d64160661d549e156cd159194bddbb56bdaf0476e80610.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\DEMB8F0.exe"C:\Users\Admin\AppData\Local\Temp\DEMB8F0.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\DEMF9B.exe"C:\Users\Admin\AppData\Local\Temp\DEMF9B.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\DEM65BA.exe"C:\Users\Admin\AppData\Local\Temp\DEM65BA.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\DEMBBF8.exe"C:\Users\Admin\AppData\Local\Temp\DEMBBF8.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\DEM1255.exe"C:\Users\Admin\AppData\Local\Temp\DEM1255.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5af9f17bceeaa2a031b3c6aab0e859bb0
SHA1c5b60a674379c9a4ce62d23d704ff26c7b9004f0
SHA2560e25aae47d45c0dd244a6533052e21f8c2e3d0893a4bf9b59699f574484ac6b9
SHA51245e21d6a2a5a1101ed66879c0573469e4360c16973711ccfd30a31ba9349adf490250e75b23c4a4ea802f609346d98f134663e2670b4531577a0cdbceb38b5f6
-
Filesize
15KB
MD5ed13624457caaa6514a959682bb07b01
SHA130b0f4b1ee640d0f1566c2420726e3421b785eb9
SHA256eff69b3d2db021c22af8358b8fb74529915df52fbeec6a7d57b44756e8466ddf
SHA5126df2dfae92f85ac02e6b89f06987593b15544edb74c3e0c5edc110058ea0ad42234f2af5d4736f5227b63ab9e589c73ba6c30f8532be8561dbac38dc0ce06603
-
Filesize
15KB
MD5f711f9d4a30d42e8b60ef40f7c1560ea
SHA192d137984b2491b7d3c323310a931b89e576facd
SHA25648a92c550c43f09b41bb974b9033c1c697e6d1aba5889b9c875f2e67d186597f
SHA51259d0e76f6d9569a6434927b06677fdb3088dc6ed619181543c9f1822a6d94f31b7934d8124ef6fe98f3fc2c2e67c32ba1efb01b2c4a99312cc00060c8b817b68
-
Filesize
15KB
MD5ea369dee882369182b58811842865ab0
SHA1279fada1f1d544d3f7fae658a4498acdc4801309
SHA2563720d4574d0a0d53835c6971ad9e6a949175e3e9934556e69dec57dbee87f8a7
SHA51256dc5871c4cd6e646e99451966d5253f1daad58d0cbd16b4c9525a1eb8f70c4efc0b627bad6957d41d92f0960b21d41b0749eb21efd6fa8790ab8a2fa9b9ef49
-
Filesize
15KB
MD50e8eba067d840e260ed2db449e39584f
SHA1e55cf8eab5aa347aaafaeef56599a5debd68e6e4
SHA256c4efb7eb69e3ce8283adb7a4504b63626aea98c23489b6adac760152ccb02095
SHA512bf9be901db2dcbd8763b7b9a1a509de077671e2b3980aaabaee7bf42e51b616e7751a867f53dd94924ec7de83f097783be38e3cf8c7f5a67a13dea9631469f0c