Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe
Resource
win10v2004-20241007-en
General
-
Target
2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe
-
Size
133KB
-
MD5
d6fbe07dc4479b81cf3fcca659ecf7b5
-
SHA1
e4265d86d805795984b9bb8af92d19ec55dfbc21
-
SHA256
2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195
-
SHA512
719cf92bede2b306d6f8c4d31512428f68cf9178840a80322890f4761fae4c5d32a6453d9cf8274515e4c8622de5a906d8f7158e701df1e9ea8a1b4a44b02f43
-
SSDEEP
1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjKX:xPd4n/M+WLcilrpgGH/GwY87mVmIXaW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe -
Executes dropped EXE 1 IoCs
pid Process 3092 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" 2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1188 wrote to memory of 3092 1188 2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe 84 PID 1188 wrote to memory of 3092 1188 2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe 84 PID 1188 wrote to memory of 3092 1188 2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe 84 PID 3092 wrote to memory of 1440 3092 wn2ra4ohzdr.exe 93 PID 3092 wrote to memory of 1440 3092 wn2ra4ohzdr.exe 93 PID 3092 wrote to memory of 1440 3092 wn2ra4ohzdr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe"C:\Users\Admin\AppData\Local\Temp\2c956dbbe6148be036c83f263c1dca1ccdfa889a493b924a53186eb0d72ed195.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵PID:1440
-
-
Network
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request92.12.20.2.in-addr.arpaIN PTRResponse92.12.20.2.in-addr.arpaIN PTRa2-20-12-92deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.130.81.91.in-addr.arpaIN PTRResponse
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
0.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
92.12.20.2.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
182.129.81.91.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
133.130.81.91.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD59dc314da8d58844b34c837e59836a63f
SHA1b853311462a56637b571a107438b8822726f70a0
SHA256576126a04bf46517ee2046236ec377d9cb540d161d911aadf6cbb77ee7cfbe73
SHA5127a0d2866f61134d722e1ba23033a8438e69eb6e7ecf1a4a726695e0e6ae21bd480e6fa3d5f98bbe391307e9d21452d1fc396bfcb1d1ab5b4a6f69ea2a5527dbf