Analysis
-
max time kernel
112s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe
Resource
win10v2004-20241007-en
General
-
Target
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe
-
Size
20KB
-
MD5
fd01b96befef060da133465b23dab5ee
-
SHA1
247f17ab86ec296e0d0b7a1d17060960fe82e8d4
-
SHA256
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85
-
SHA512
5f6ff87ac7d0b8acd5e131cac5f65268cbff0eb4ec9ad4bce59d0379ea942474eb2d7a6ac6c67f36f79eebf7a71684a3041000aa3063d29d681239729440d818
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMx+L4113:hDXWipuE+K3/SSHgxmHZ19
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEMCCB1.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEMC6BB.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEM1E80.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEM75C7.exe -
Executes dropped EXE 4 IoCs
pid Process 3252 DEMC6BB.exe 4892 DEM1E80.exe 2344 DEM75C7.exe 2972 DEMCCB1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM75C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMCCB1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM23DA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC6BB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1E80.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3252 3564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 98 PID 3564 wrote to memory of 3252 3564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 98 PID 3564 wrote to memory of 3252 3564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 98 PID 3252 wrote to memory of 4892 3252 DEMC6BB.exe 103 PID 3252 wrote to memory of 4892 3252 DEMC6BB.exe 103 PID 3252 wrote to memory of 4892 3252 DEMC6BB.exe 103 PID 4892 wrote to memory of 2344 4892 DEM1E80.exe 106 PID 4892 wrote to memory of 2344 4892 DEM1E80.exe 106 PID 4892 wrote to memory of 2344 4892 DEM1E80.exe 106 PID 2344 wrote to memory of 2972 2344 DEM75C7.exe 108 PID 2344 wrote to memory of 2972 2344 DEM75C7.exe 108 PID 2344 wrote to memory of 2972 2344 DEM75C7.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe"C:\Users\Admin\AppData\Local\Temp\58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\DEMC6BB.exe"C:\Users\Admin\AppData\Local\Temp\DEMC6BB.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\DEM1E80.exe"C:\Users\Admin\AppData\Local\Temp\DEM1E80.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\DEM75C7.exe"C:\Users\Admin\AppData\Local\Temp\DEM75C7.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\DEMCCB1.exe"C:\Users\Admin\AppData\Local\Temp\DEMCCB1.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\DEM23DA.exe"C:\Users\Admin\AppData\Local\Temp\DEM23DA.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD59229868159f3ba4b7c8f3492dfe17181
SHA18777a38c1f13d993bcd5b0b05b9ecc8814c2fd2d
SHA2562eb90b1e209c73552dc7a793f3c668f3963c93e2365304f83866adcad038db08
SHA512e3b202d78eead74b7504378a7f741bba3d9895e300e2d2ebf6b922dfda3cd4832a559118def952d83873b39f942423d633a5733028c80225bdb8f2f775a5b00f
-
Filesize
20KB
MD59782dfe4a9c48f589bd0a1db74f78ace
SHA1da89258f393c6f7c9310889cc64ba87e54b5f7c4
SHA25614ae534c9104307018f88cf7e9bc9eb9cb5638bf5f767568a5f2536a817e1c29
SHA51240a8aab044851ed17cea0e582178f9d4d9545a0403321e7675578e06f277cc77d82a8f8bb857ded2f47ca3208d1b975a631cb6c95b97b0e1abb0c2ae285928ad
-
Filesize
20KB
MD5a372b199f222137c815f05096f9d7816
SHA16c7e53533c79dba881985d4d1cd7936c29c35072
SHA2562df8e30585fd4c24c2919438a892367fd986905d1ed14b5fb0ee6d6c876e1c5e
SHA5122e21970393eac3369047edcb27b24aa824f9445dd456e4c38e47c6341bd6b1e026641559e5ab6d4b1a9aba42ec1c5bf1b2c8fe2c6425e0588a79701c78f05052
-
Filesize
20KB
MD585d65256066a2bd41e23fb21e73e20a2
SHA1974b70c56e76b8419a3e04d3c53dace7d0d9e445
SHA256e78b5a186d3ed49b468c33d25b5a50668ecb99229327d65b6a36a55155b34375
SHA512a3f9c22dd85a092b2ed643120e247a6c2df0d72d07e0da51d61d53bbcc5315bffcca6fd1a931b7db2114883d88cbcf0e947a4d65e06590fa5274cf6e9df17a8c