Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 05:12
Static task
static1
Behavioral task
behavioral1
Sample
6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe
Resource
win10v2004-20241007-en
General
-
Target
6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe
-
Size
255KB
-
MD5
3814b1e3275621d0fd2d800b66c37460
-
SHA1
aec0738d7c89a5ff5d5486616519aaaaf40f7c01
-
SHA256
6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930
-
SHA512
df80fec77c5649539a596ad1d06f1a3f9049015ac61b61d4ba1d891d28fb866ea992d66f8f8b215a742b81ba5d2d7e9c202a8c832944dcc0b47b245da9663bcc
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ9A:EeGUA5YZazpXUmZhmA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe -
Executes dropped EXE 1 IoCs
pid Process 3612 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3612 4952 6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe 89 PID 4952 wrote to memory of 3612 4952 6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe 89 PID 4952 wrote to memory of 3612 4952 6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe 89 PID 3612 wrote to memory of 1472 3612 a1punf5t2of.exe 90 PID 3612 wrote to memory of 1472 3612 a1punf5t2of.exe 90 PID 3612 wrote to memory of 1472 3612 a1punf5t2of.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe"C:\Users\Admin\AppData\Local\Temp\6ce44f34bd45f608f0d6f7078eb8f662258f046d1c1ba19a1f9da2a475632930N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:1472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD51af05aa27446ffca4ab12db5311cf2e6
SHA19753162662afcfcd1c1d5b6ee4588894be308443
SHA2568fad780e5c90e79b2b1b94ec987c155a537b9482253e9802fbcf4041e76403d9
SHA5125cea58a443229036c13c28874c762b7e1dc00ff757ffd0e0566e43a7bcf4e4bf9d2968f14c4f060959baa05bec64460dc5377240b15d277f6fb9d44d3369dc3b