Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe
Resource
win10v2004-20241007-en
General
-
Target
9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe
-
Size
16KB
-
MD5
2e229894f3234fa5cb3cd34dc009ac30
-
SHA1
d3dfc8bcc28b15f4414a2d214f538b7e5c1d6daf
-
SHA256
9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4
-
SHA512
69745865cb34d1698231244952856eaee36c298f5931dafc5a6f6632ba3b603d13536868f280ccd897ed89baaa480c8eb4cf7955f7bee5c12f5ae782a89cf3fe
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhR0pkzTb:hDXWipuE+K3/SSHgx4GzH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM7956.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEMD040.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM26DC.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM7D88.exe -
Executes dropped EXE 5 IoCs
pid Process 5068 DEM7956.exe 1512 DEMD040.exe 1200 DEM26DC.exe 4872 DEM7D88.exe 4980 DEMD452.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM7956.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM26DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM7D88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD452.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2360 wrote to memory of 5068 2360 9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe 96 PID 2360 wrote to memory of 5068 2360 9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe 96 PID 2360 wrote to memory of 5068 2360 9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe 96 PID 5068 wrote to memory of 1512 5068 DEM7956.exe 101 PID 5068 wrote to memory of 1512 5068 DEM7956.exe 101 PID 5068 wrote to memory of 1512 5068 DEM7956.exe 101 PID 1512 wrote to memory of 1200 1512 DEMD040.exe 103 PID 1512 wrote to memory of 1200 1512 DEMD040.exe 103 PID 1512 wrote to memory of 1200 1512 DEMD040.exe 103 PID 1200 wrote to memory of 4872 1200 DEM26DC.exe 105 PID 1200 wrote to memory of 4872 1200 DEM26DC.exe 105 PID 1200 wrote to memory of 4872 1200 DEM26DC.exe 105 PID 4872 wrote to memory of 4980 4872 DEM7D88.exe 107 PID 4872 wrote to memory of 4980 4872 DEM7D88.exe 107 PID 4872 wrote to memory of 4980 4872 DEM7D88.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe"C:\Users\Admin\AppData\Local\Temp\9c6d49bc0434849338c7a26a67249ceb15aced2b3ee1e8cb9003c04b03e15fb4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\DEM7956.exe"C:\Users\Admin\AppData\Local\Temp\DEM7956.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\DEMD040.exe"C:\Users\Admin\AppData\Local\Temp\DEMD040.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\DEM26DC.exe"C:\Users\Admin\AppData\Local\Temp\DEM26DC.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\DEM7D88.exe"C:\Users\Admin\AppData\Local\Temp\DEM7D88.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\DEMD452.exe"C:\Users\Admin\AppData\Local\Temp\DEMD452.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4980
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5133e562abf2c9699cf8c4c97d742f342
SHA1fa8cc1bbf2347ad63d9b48efa86ad916288f3ca7
SHA25681f7672d7acfa693ce54f321e7338c0f6ed5f2858e21f514fff8ddc980057af7
SHA512c0d2a080053b020827004eddc83f94de5e9aec790a79730ac126ef2490f6365489d6dc9fa96a4ee7036791596dd0f5531ec9b1804b608261c66210d64c762e42
-
Filesize
16KB
MD5d15b114832f3a21e5e6f561e7a710571
SHA175f6d46a70344eac40b01b4af1b37febf81fed4b
SHA256bfad67f385727f21e46cbc030ab9ce92e28be692171f78a56b7d9f3690cc1811
SHA5129b788abbbe401e86b6a94dc4e761a7e2e8dba4d4a3f0487ffa9a10d2f365ba0d9693ddb1d54b205dbda4a984a2fa999546f8bc3976e76e1ca3d98d6ed9315d24
-
Filesize
16KB
MD5b59bc785347964d55d4924a468a3b140
SHA136a9ab0a7cb058be1778df5757f06538d6e649a8
SHA2563b728cf3596944507d0c42519145bb545c2048ab1a1a516a03cb6c6de7ddb9f1
SHA5124648cc7dcdfa9fa4bfab15b6d6ceb164f2cd10bb09590802b3badab6a1ac9b2aab5a3a082c4de231b638078711578a2b435b5b19dc4007bdd2f2414b8cad539d
-
Filesize
16KB
MD5d1c47aae44a9323e50f5038627cee99b
SHA169b425a39a311e538526132fc3132a10f1e9ee20
SHA256683551a7c76230febaca31bcb5a972264e0ce9f1512841219fa68d5148f85cbb
SHA5123544e1d2d8a6d37684fa18c4440440e9abd776d62fa56e34ca95195fb93cd93eb09dd002d3f41d5eee796e6984b645415a27918a648ee47379ff83500c280a93
-
Filesize
16KB
MD5294ecb4dac99ec1e5dccbc2a170d383b
SHA142453ba944c305674cf61aaaef95002ad0442be7
SHA2566e70e798ecfbd95365852884ac30135a5ab3bcd940d2aa20c0ab3dcd54871567
SHA512a6165e2d4f951cb751c3e41b815819fc07cb4f48a64674b56bf688cd2814ae991790798b40fc778aa203c579e20f6256f0492a70b4f57da99c1802f774591d68