Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe
Resource
win10v2004-20241007-en
General
-
Target
22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe
-
Size
16KB
-
MD5
b0e05181a30116cd1befa351b933e310
-
SHA1
44519a4290f97ca5ce353226aa08317c55f7a82e
-
SHA256
22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea
-
SHA512
5ec47d852cd20b0c1d6cef7d0ada97e0f3d6a2432271e1ffc9cf4cd14facdb01f26e18cd6e6591f8f351e519456ef02c39d4fbed9bb1ee995abcaa10396883d2
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhZlDH:hDXWipuE+K3/SSHgx3lDH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM7D5E.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEMD4F3.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM2BDD.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DEM82B8.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe -
Executes dropped EXE 5 IoCs
pid Process 4824 DEM7D5E.exe 3180 DEMD4F3.exe 4488 DEM2BDD.exe 2384 DEM82B8.exe 4740 DEMD934.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM7D5E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD4F3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM2BDD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM82B8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD934.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4824 5072 22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe 97 PID 5072 wrote to memory of 4824 5072 22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe 97 PID 5072 wrote to memory of 4824 5072 22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe 97 PID 4824 wrote to memory of 3180 4824 DEM7D5E.exe 102 PID 4824 wrote to memory of 3180 4824 DEM7D5E.exe 102 PID 4824 wrote to memory of 3180 4824 DEM7D5E.exe 102 PID 3180 wrote to memory of 4488 3180 DEMD4F3.exe 104 PID 3180 wrote to memory of 4488 3180 DEMD4F3.exe 104 PID 3180 wrote to memory of 4488 3180 DEMD4F3.exe 104 PID 4488 wrote to memory of 2384 4488 DEM2BDD.exe 106 PID 4488 wrote to memory of 2384 4488 DEM2BDD.exe 106 PID 4488 wrote to memory of 2384 4488 DEM2BDD.exe 106 PID 2384 wrote to memory of 4740 2384 DEM82B8.exe 108 PID 2384 wrote to memory of 4740 2384 DEM82B8.exe 108 PID 2384 wrote to memory of 4740 2384 DEM82B8.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe"C:\Users\Admin\AppData\Local\Temp\22e724068bb8abac1701735bfa0c4880e537ef0c133e70b6c9206730dc9f6aea.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\DEM7D5E.exe"C:\Users\Admin\AppData\Local\Temp\DEM7D5E.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\DEMD4F3.exe"C:\Users\Admin\AppData\Local\Temp\DEMD4F3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\DEM2BDD.exe"C:\Users\Admin\AppData\Local\Temp\DEM2BDD.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\DEM82B8.exe"C:\Users\Admin\AppData\Local\Temp\DEM82B8.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\DEMD934.exe"C:\Users\Admin\AppData\Local\Temp\DEMD934.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4740
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD57d3c893caceba9dcf5b4e1d9beba3f7f
SHA17eee576ad350edc9e65a7048aa0435bf9dc789f2
SHA256f4d9c0fc51d1b605a0dd83576342ea2d676e75d5af0888eb7df9172c4610df51
SHA512c29edc13af6a1ca2acade1c09247a969d88360ab8d1c9458f9518d47029a48afc43170c017fb12427569b6a045296b6eb384567b0333a4e8741a6fe1a517d8e5
-
Filesize
16KB
MD5072b7c89fbf29257663e860757ff6830
SHA1484d4cae6a365622abd012f75facdc946b950bbf
SHA256e092e0947245bcf2942d504584367f5ae50491d70ebf8c5db335ba4f551fa9af
SHA5122d236734c6f7e2743b1a7e4c5587848947b9d481dc6cdcf96d793e81aa0050469d7be6f5924a8b2d71836bed288c1db01384886f67d2651e61ffeeeb4d0bdded
-
Filesize
16KB
MD5f269af8f9572efedd647f809e5de9318
SHA12f46f28dc1dbb14fce711d630d27bfe590bbd9bc
SHA2562f9fc686aad970f925c5829a4430c0f3c9323f23e2e2dde9f4c0f0bbc8b90bbc
SHA512e0bf9130709cf4565d9e68f0b634b3aa2d76a48303be4f26b9552919d967b774d897726119f71afc18378a83e6dd64e574aac0d00db32c755dbe4549fb4b8594
-
Filesize
16KB
MD5840d8c667035c07d5b344e0c82a4d072
SHA174cef2ba23e34c1de045a4bde1e13b4f17520b04
SHA256ee661c677b0835e780071384d7f7f5d3211b216204e5275e566260484060fac7
SHA512fa96f6fc0bad5263d3a487f3e90dca2318d335b32fe83081f39d21a64f41b3f601ccc919ed340507582389527348ce3a665ccc0d089eac0cdc5af360ccd8077b
-
Filesize
16KB
MD58e79610c1847d4817f7328e3e99db67d
SHA1fb33216248f616dc23fd4a15b026fe24d59d93eb
SHA256f7d4ec77ba0c1b92c4801c3c53440ecbc9e6d8cd1a88f4c355cc977b1935367a
SHA512ac51b3d666549378cf4c64216149c3adfaf0a1296f5fcd4b0a4461e81ca74a827d15413f4b4f3f112d37595bb730e47c4af90615db307c7f61fb49c4ed33e0fe