Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe
Resource
win10v2004-20241007-en
General
-
Target
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe
-
Size
140KB
-
MD5
30f7acc51821a12ab4eb1cd9a0dcff94
-
SHA1
06d744b9f8982e4b36896f38f75463100f644bda
-
SHA256
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3
-
SHA512
e601feee4fb460ce512ff232f397a003024fdd11c06ecd4181e48c70d1addb13bd969ddb19295aaed2883614bd3eb43546ffa516367eb522cdd2e4baf785c760
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVS7:xP6/M+WLckOBhVmIYI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe -
Executes dropped EXE 1 IoCs
pid Process 5004 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4460 wrote to memory of 5004 4460 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe 84 PID 4460 wrote to memory of 5004 4460 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe 84 PID 4460 wrote to memory of 5004 4460 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe 84 PID 5004 wrote to memory of 2572 5004 wn2ra4ohzdr.exe 93 PID 5004 wrote to memory of 2572 5004 wn2ra4ohzdr.exe 93 PID 5004 wrote to memory of 2572 5004 wn2ra4ohzdr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe"C:\Users\Admin\AppData\Local\Temp\b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5103f58bc4fce988f67710ea9e4972f21
SHA1228a3bd27ca8f13a2355438b356b950b97ba6454
SHA256c54afdb87b3688f9965dfaefc2b62df454c38ad813545d31122c579bd449d985
SHA51279c919e089b7bb857f816c85c34a3ea336b2f475d279a9b927fd214bba30eae5d103617d1601c624547faf122351c3dc01ecdf059672a53016403c3d4419feca