Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe
Resource
win10v2004-20241007-en
General
-
Target
c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe
-
Size
416KB
-
MD5
d2d948797e97fdd6fb94b9f7e739e200
-
SHA1
996ca61f7588f8bcce138dca46d890f6c575518c
-
SHA256
c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4f
-
SHA512
181b91471977c8ebf14916c1ffdd213f2c320d68454e1a03aeb8d38bbed8f7619df97c12d77d99de6381140822d92193d02fefde982ef3a0a748e87425da171a
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUwg:ITNYrnE3bm/CiejewY5v0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe -
Executes dropped EXE 1 IoCs
pid Process 3712 ximo2ubzn1i.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3408 wrote to memory of 3712 3408 c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe 84 PID 3408 wrote to memory of 3712 3408 c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe 84 PID 3408 wrote to memory of 3712 3408 c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe 84 PID 3712 wrote to memory of 1924 3712 ximo2ubzn1i.exe 85 PID 3712 wrote to memory of 1924 3712 ximo2ubzn1i.exe 85 PID 3712 wrote to memory of 1924 3712 ximo2ubzn1i.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe"C:\Users\Admin\AppData\Local\Temp\c5a5ebc4a1f0d0e64ef597a219ae409dfece24af8fc582419874bf1d81f09f4fN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:1924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD54c160b3fe015f2d63631d0569683e078
SHA14c3776672054d6aaaec852ffcdcf285423bce708
SHA2565a119a23a884b4588621ebe9ec19e5de4643bfb2cfbdfc4369d63c769de7f9c7
SHA512a299138e741fb01e9b066e11532cb0da7effcb81dfdfe9446353cd2c59dc54f7d0f9c2cb501d7bbd3a15be9ff7a58a4e976580397f5bc39a4acd1078c7f1fd9c