Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 20:10
Static task
static1
Behavioral task
behavioral1
Sample
d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe
Resource
win10v2004-20241007-en
General
-
Target
d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe
-
Size
279KB
-
MD5
27d96d57a5469f711dcc3901b5647530
-
SHA1
5346b1e704650d29e5be10170744adfdd55738d9
-
SHA256
d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59
-
SHA512
85c4983b33ff004f69e4dd7d94596516d0f7a76760b71727ee5605fef6d35475235f250e868bf346470d6ec5c79ff7a7bde9dcf12f031427760db244b2662b4c
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fB:boSeGUA5YZazpXUmZhZ6p
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2116 2260 d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe 95 PID 2260 wrote to memory of 2116 2260 d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe 95 PID 2260 wrote to memory of 2116 2260 d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe 95 PID 2116 wrote to memory of 4912 2116 a1punf5t2of.exe 96 PID 2116 wrote to memory of 4912 2116 a1punf5t2of.exe 96 PID 2116 wrote to memory of 4912 2116 a1punf5t2of.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe"C:\Users\Admin\AppData\Local\Temp\d0e4ac25dd052fc6f084574b934edde4b2d028c3cb5c27c58d159712c09daa59N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:4912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD52fdbbf60e3643064e1d2e5e600725a6a
SHA1599eb6ae49e2ce120e289cd82abd7534c5926b8f
SHA2562be4fec53a3b339c4dbcd4ff2219a4ab06e67a36ae46637dfcda79ff896ed3ee
SHA512100e4bc5e928d07ab26da8eb10360274959287fc2f8cb8d6a2e4670c61f8074b49260d4c4cb913f2061ddefde882fcef845ce9d92c5a7e34d902522b1c9d9fcb