Analysis

  • max time kernel
    106s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 12:06

General

  • Target

    f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe

  • Size

    416KB

  • MD5

    1d04b3209c2c7b14c3b3b12c1fc36b00

  • SHA1

    8cfa26cab15378ebcfd0e059cacdc541f1a997c3

  • SHA256

    f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e

  • SHA512

    935914dcf24c3725332ed13e237d49449d5e74a37d39b060cd190a2167794cb08981cb365fac54e27d84852450906f6ea7bdbf0938e0b946deddd7f829200435

  • SSDEEP

    6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU0:ITNYrnE3bm/CiejewY5vb

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe
    "C:\Users\Admin\AppData\Local\Temp\f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe
      "C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
          PID:1248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe

      Filesize

      416KB

      MD5

      0b40fc317a011374465b27ae90bf5270

      SHA1

      693c65f71f3b4e8adeb4d54fc5b1ab2a42b272af

      SHA256

      6337a44ed4f00505e9bbc9014d99020dbc25a28abf4bb1cfac3b3c201c00e612

      SHA512

      9595c29c18ae380e7f3bbb31d2efaf39a9ea20e3dae50d1268c0724eaa051f98aaf4fe1ed1c3ce483f4ba2084174c9433b2e8cb61b6a33d0ceee8053143c0d5c

    • memory/924-6-0x0000000005700000-0x000000000573C000-memory.dmp

      Filesize

      240KB

    • memory/924-2-0x0000000005920000-0x0000000005EC4000-memory.dmp

      Filesize

      5.6MB

    • memory/924-3-0x0000000005370000-0x0000000005402000-memory.dmp

      Filesize

      584KB

    • memory/924-4-0x0000000005350000-0x000000000535A000-memory.dmp

      Filesize

      40KB

    • memory/924-5-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/924-0-0x0000000074EAE000-0x0000000074EAF000-memory.dmp

      Filesize

      4KB

    • memory/924-1-0x00000000008E0000-0x000000000094E000-memory.dmp

      Filesize

      440KB

    • memory/924-20-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/2256-21-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/2256-22-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/2256-23-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/2256-25-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB