Analysis

  • max time kernel
    104s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 03:49

General

  • Target

    a4b7d24e3a26d9b382d93270599e67d986004d274d85e6dd95c046b29a91bebaN.exe

  • Size

    78KB

  • MD5

    c880c6ce4ebb7d80c8f9d380334aea30

  • SHA1

    fb4e1c560988a663190bede3c3ab0be617de6d34

  • SHA256

    a4b7d24e3a26d9b382d93270599e67d986004d274d85e6dd95c046b29a91beba

  • SHA512

    2c95a6c25e337eb21a5f291119b3eeaaf58940c99534fbf0ad4eae08f0c8ec4643de0f431d6de6c1e21f27999b2b15fd799dbc6854847fa349a37e34437f1217

  • SSDEEP

    1536:XRCHY6M7t/vZv0kH9gDDtWzYCnJPeoYrGQteV9/K1Q+:XRCHYnh/l0Y9MDYrm7eV9/o

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4b7d24e3a26d9b382d93270599e67d986004d274d85e6dd95c046b29a91bebaN.exe
    "C:\Users\Admin\AppData\Local\Temp\a4b7d24e3a26d9b382d93270599e67d986004d274d85e6dd95c046b29a91bebaN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\_-4izblg.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4452
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES780E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF907633E289F40DDB6F1F6B0AAFCC1F7.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4908
    • C:\Users\Admin\AppData\Local\Temp\tmp7668.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp7668.tmp.exe" C:\Users\Admin\AppData\Local\Temp\a4b7d24e3a26d9b382d93270599e67d986004d274d85e6dd95c046b29a91bebaN.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES780E.tmp

    Filesize

    1KB

    MD5

    47c489b64477ff7b1d0d2158468b6349

    SHA1

    2ce4a6a66ea7563f425a86f8cffb5dc28f6e053e

    SHA256

    27a1341c373a0035268299de270de6f4ebfe9b676155ee872952f8f9300a9ae7

    SHA512

    fc660e5d317cb19b7e1fb2fc3630004d1f8d84b4f95fa97eda46772ffe5ba1d85354247f7d691fa81b2c9a5a23507890d3645e86f5d5e0ef1e14ae65bca3eefe

  • C:\Users\Admin\AppData\Local\Temp\_-4izblg.0.vb

    Filesize

    15KB

    MD5

    08586a8715784d14df5e056240263290

    SHA1

    d19c588be5cd0a7348d030fd5d4908614e8af2fa

    SHA256

    782cf5257c3c23758ea3a0282c6b8492f706ca89d71dd93f0b80439bcec054bb

    SHA512

    6ffde07357131ad8e2849beacf4d8bc82702bb69d14676c75ecfeced4e852aaa23a42a6e7c6a8e71e2ba942dfa004f5811a730f390f61fa7570c5616fde71222

  • C:\Users\Admin\AppData\Local\Temp\_-4izblg.cmdline

    Filesize

    266B

    MD5

    e964d84249eb9c6ec1e5b737953eefce

    SHA1

    50e163e4e640d662b54c11b90bf4dfd15a4f10e3

    SHA256

    bb3b23c339328e6e93f900e45f0fbac987211a631412a8f41e27ad8bb36f5ad6

    SHA512

    70a7fb3493b1a02ae0d17679ff35eb2d7d50a368cca881e3fde840d8bede56a404d3a4cc7608475ce976f61ad15a7075dd9f05c5506d4a0eb015f212eade1e4f

  • C:\Users\Admin\AppData\Local\Temp\tmp7668.tmp.exe

    Filesize

    78KB

    MD5

    aded5d19e6156b43ac596cab5ca58989

    SHA1

    d61a4847f158231df65ee3ae95e672c6bf31e913

    SHA256

    6ea9136c2a1c89336620ec1f3fd70baa0c6939c079c675b7b459306baa40f3aa

    SHA512

    31613f3d24b00aa6cfd097cfbb8fdaf9baab2be4d0e9b7eff32c06fa7d62232a4b6b58a641510a05d3cac2688fd6e47265e2a5f0b1269ca2f651ec3eceef6e39

  • C:\Users\Admin\AppData\Local\Temp\vbcF907633E289F40DDB6F1F6B0AAFCC1F7.TMP

    Filesize

    660B

    MD5

    2aabf13998457721660e463fdc902cf1

    SHA1

    598f638cffd74432a8c00be92bbab931b8891959

    SHA256

    e12d76e05e8daa30b6b2e98d430d43218846d7d50586bdeb622b83e03b8ae0d0

    SHA512

    112d6c4556e4960809a4cda22d8982d371460b4796073061ec7eab54e41dcddc225865183a7bf36d5d60102db26ed0391da705fd65d1017f19af175c12b929e0

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/4452-18-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4452-9-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4480-2-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4480-1-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4480-0-0x0000000074692000-0x0000000074693000-memory.dmp

    Filesize

    4KB

  • memory/4480-22-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4828-23-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4828-24-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4828-26-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4828-27-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB

  • memory/4828-28-0x0000000074690000-0x0000000074C41000-memory.dmp

    Filesize

    5.7MB