Analysis
-
max time kernel
112s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe
Resource
win10v2004-20241007-en
General
-
Target
94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe
-
Size
16KB
-
MD5
5427ac54feee09db3183e6fd6f368563
-
SHA1
3bd051eb7698fcb43c9bdc40ba0931ca835fe410
-
SHA256
94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3
-
SHA512
49d79300e4b78f69be4fc362161d2f1175a29160bbe21a21ff97b2b8a488a24385d61b57ba105f0335aa059e358a816cedbaeb5bb00131572df397f029bc01d5
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY0FY:hDXWipuE+K3/SSHgxm0m
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEM5C92.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEMB39B.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEMAD28.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DEM53B.exe -
Executes dropped EXE 5 IoCs
pid Process 3424 DEMAD28.exe 4248 DEM53B.exe 876 DEM5C92.exe 1936 DEMB39B.exe 4240 DEMA85.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM53B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM5C92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB39B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMA85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMAD28.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3668 wrote to memory of 3424 3668 94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe 97 PID 3668 wrote to memory of 3424 3668 94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe 97 PID 3668 wrote to memory of 3424 3668 94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe 97 PID 3424 wrote to memory of 4248 3424 DEMAD28.exe 102 PID 3424 wrote to memory of 4248 3424 DEMAD28.exe 102 PID 3424 wrote to memory of 4248 3424 DEMAD28.exe 102 PID 4248 wrote to memory of 876 4248 DEM53B.exe 104 PID 4248 wrote to memory of 876 4248 DEM53B.exe 104 PID 4248 wrote to memory of 876 4248 DEM53B.exe 104 PID 876 wrote to memory of 1936 876 DEM5C92.exe 106 PID 876 wrote to memory of 1936 876 DEM5C92.exe 106 PID 876 wrote to memory of 1936 876 DEM5C92.exe 106 PID 1936 wrote to memory of 4240 1936 DEMB39B.exe 108 PID 1936 wrote to memory of 4240 1936 DEMB39B.exe 108 PID 1936 wrote to memory of 4240 1936 DEMB39B.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe"C:\Users\Admin\AppData\Local\Temp\94da95e6aebf8c61fb02443471baf97d311c251868b648c9193519a2ae923ed3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\DEMAD28.exe"C:\Users\Admin\AppData\Local\Temp\DEMAD28.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\DEM53B.exe"C:\Users\Admin\AppData\Local\Temp\DEM53B.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\DEM5C92.exe"C:\Users\Admin\AppData\Local\Temp\DEM5C92.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\DEMB39B.exe"C:\Users\Admin\AppData\Local\Temp\DEMB39B.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\DEMA85.exe"C:\Users\Admin\AppData\Local\Temp\DEMA85.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD54c286e5cb36591fc98aa34182aa56fa0
SHA13d78941ce4a4f0bd4e700ef6f1061b45ede5f829
SHA256958e099bfc960332515c2c3e4fb755bf80a1ddc48c425e5f956cc902323b43e6
SHA512bf7d9ad2b600526c21a6e09462067601aa5e79a846aa93b2186342382aab2825b282c0f347fa553db8b18fc22d88c476953e1b7d68b71461a1c25f6e8ee57d03
-
Filesize
16KB
MD5464852696686b4f66595df27ba3ad5dd
SHA10d7c857918f913005d99eeabf07b7213b4e86fa9
SHA256378a43259664ab3bfd814056490751a19c10b5934311b5512c0b2fcb885e73d4
SHA51232230396d5ae83406959b95c779e8d6761d7e412d68723494afd8cc68b85cf1445f28f74196ed32407646dc714c68460968a7ec20f12dfc701b2a4ecd58c87ea
-
Filesize
16KB
MD5c37a4811fc2a1f6d758a397cb1bbb2d3
SHA14b5dd15473578f79bdb1ad349ef2452214cd29c2
SHA2569cec67a4c3ff29d07765958fd466be1f007389cb9fb525e0a3687d5177030efb
SHA512d7741f1862d602037c0472e645b0fee5a0f3fbd1f972baa32d29f40c4afe5c5c9c4c7052f08459248180eea6da5dd9865edad8ee2866da3e8ae825ea0cbfab1e
-
Filesize
16KB
MD51b5a255d476b46041fe1860e4d17b6b6
SHA1b2a9500337bd7e2c794e5241a6334a8f8baec283
SHA256855d23b482fb440068981202bf1afce7af083929c3859ac26bd01d8918c486e6
SHA512194763f2a72ee6e107331fe329f77d80d3a5c886ef15bdd2f600bfdb02242ddbf9a30127ebfa5626ec5bd95cd097a98db271fc22165e6d33143f2e1023c58ac8
-
Filesize
16KB
MD5c415e0679eb6482207ff4efaae27bbd2
SHA10a26ed19b21b9ee524275775c51fa61120d3dc53
SHA256db09ca4f6818698bced3bfd25cce3bd5dae631866a851a03787d2f85ac7161dc
SHA5121be41b44c078073d7feb64a052d97d439306bf5f27c46edb9f5d698a2fc75f738983958f66c5c52213572d64cfd370bbd7334ed92aaae0d27dadf6130f59f21f