Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 02:25

General

  • Target

    b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe

  • Size

    140KB

  • MD5

    30f7acc51821a12ab4eb1cd9a0dcff94

  • SHA1

    06d744b9f8982e4b36896f38f75463100f644bda

  • SHA256

    b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3

  • SHA512

    e601feee4fb460ce512ff232f397a003024fdd11c06ecd4181e48c70d1addb13bd969ddb19295aaed2883614bd3eb43546ffa516367eb522cdd2e4baf785c760

  • SSDEEP

    3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVS7:xP6/M+WLckOBhVmIYI

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe
    "C:\Users\Admin\AppData\Local\Temp\b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe
      "C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe
        "C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"
        3⤵
          PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe

      Filesize

      140KB

      MD5

      103f58bc4fce988f67710ea9e4972f21

      SHA1

      228a3bd27ca8f13a2355438b356b950b97ba6454

      SHA256

      c54afdb87b3688f9965dfaefc2b62df454c38ad813545d31122c579bd449d985

      SHA512

      79c919e089b7bb857f816c85c34a3ea336b2f475d279a9b927fd214bba30eae5d103617d1601c624547faf122351c3dc01ecdf059672a53016403c3d4419feca

    • memory/4460-6-0x0000000005080000-0x00000000050A0000-memory.dmp

      Filesize

      128KB

    • memory/4460-2-0x00000000053A0000-0x0000000005944000-memory.dmp

      Filesize

      5.6MB

    • memory/4460-3-0x0000000004CF0000-0x0000000004D82000-memory.dmp

      Filesize

      584KB

    • memory/4460-4-0x0000000004DA0000-0x0000000004DAA000-memory.dmp

      Filesize

      40KB

    • memory/4460-5-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/4460-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

      Filesize

      4KB

    • memory/4460-1-0x00000000002D0000-0x00000000002F8000-memory.dmp

      Filesize

      160KB

    • memory/4460-20-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

      Filesize

      4KB

    • memory/4460-22-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-21-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-23-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-24-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-26-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB