Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 06:24
Static task
static1
Behavioral task
behavioral1
Sample
a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe
Resource
win10v2004-20241007-en
General
-
Target
a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe
-
Size
280KB
-
MD5
81b40a6f1d521e068267162b4ddf2e0a
-
SHA1
9671610269df777e2ed847be54748ccc3ba778d1
-
SHA256
a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684
-
SHA512
0f2e7501dfad9acab02d467f651fa4739fe85a2d4f3094bfacce35c077b212c9f62e98752bdfbe83b54e87e0335df22b7bd18e6382ef048570807a1a427d0983
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66f3G:boSeGUA5YZazpXUmZhZ6fG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe -
Executes dropped EXE 1 IoCs
pid Process 4332 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3772 wrote to memory of 4332 3772 a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe 96 PID 3772 wrote to memory of 4332 3772 a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe 96 PID 3772 wrote to memory of 4332 3772 a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe 96 PID 4332 wrote to memory of 2956 4332 a1punf5t2of.exe 97 PID 4332 wrote to memory of 2956 4332 a1punf5t2of.exe 97 PID 4332 wrote to memory of 2956 4332 a1punf5t2of.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe"C:\Users\Admin\AppData\Local\Temp\a8232796cd480862dccbb1906ce4e9c6541ea27f0aa1f9a0e632563128dc7684.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD579d7d872177244a55e19358bbd44d517
SHA11467803be8d62b25bef14ba6cecad700fd3a2b4b
SHA256a2875616c61c2ad6edab77edd87752a4aa258aa04125695aa943f36b885d61e5
SHA5129333fb7e72b7c11a94ec72d485ccca95cf820427fd811b4271392d7d6e22fb0f997f1ed974f6cffc007b89ddd3849055a842b74b45a6aa3dea8101727fd5d0ba