Analysis
-
max time kernel
106s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe
Resource
win10v2004-20241007-en
General
-
Target
f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe
-
Size
416KB
-
MD5
1d04b3209c2c7b14c3b3b12c1fc36b00
-
SHA1
8cfa26cab15378ebcfd0e059cacdc541f1a997c3
-
SHA256
f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e
-
SHA512
935914dcf24c3725332ed13e237d49449d5e74a37d39b060cd190a2167794cb08981cb365fac54e27d84852450906f6ea7bdbf0938e0b946deddd7f829200435
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU0:ITNYrnE3bm/CiejewY5vb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 ximo2ubzn1i.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 924 wrote to memory of 2256 924 f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe 84 PID 924 wrote to memory of 2256 924 f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe 84 PID 924 wrote to memory of 2256 924 f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe 84 PID 2256 wrote to memory of 1248 2256 ximo2ubzn1i.exe 85 PID 2256 wrote to memory of 1248 2256 ximo2ubzn1i.exe 85 PID 2256 wrote to memory of 1248 2256 ximo2ubzn1i.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe"C:\Users\Admin\AppData\Local\Temp\f1f506dd66bf3c5da9ea6ca58071e03d8a249b45fa52e57af52e001ac0e8483e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:1248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD50b40fc317a011374465b27ae90bf5270
SHA1693c65f71f3b4e8adeb4d54fc5b1ab2a42b272af
SHA2566337a44ed4f00505e9bbc9014d99020dbc25a28abf4bb1cfac3b3c201c00e612
SHA5129595c29c18ae380e7f3bbb31d2efaf39a9ea20e3dae50d1268c0724eaa051f98aaf4fe1ed1c3ce483f4ba2084174c9433b2e8cb61b6a33d0ceee8053143c0d5c