Resubmissions

21-01-2025 17:40

250121-v8zm2swjck 6

21-01-2025 16:56

250121-vfsn2atpfl 10

Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 16:56

General

  • Target

    fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe

  • Size

    280KB

  • MD5

    bace252b49b68a0099f8ecdda382b250

  • SHA1

    49c319ec9fdebe5e8d896a9825fe128bc6a29af9

  • SHA256

    fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8

  • SHA512

    85b88f965fc2f4c4e9bdf34a6846d696f5759d99a8c64db3487d5e9afbfcb8494fd05751361feeed309ea8834526cf83130a535f446b8afac5de9bef111e5ea0

  • SSDEEP

    6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66f32:boSeGUA5YZazpXUmZhZ6f2

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe
    "C:\Users\Admin\AppData\Local\Temp\fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
      "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
        "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
        3⤵
          PID:1648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

      Filesize

      280KB

      MD5

      171e926dc83e183d75ef0b8ade3365ea

      SHA1

      fb78b9b1ca1e8786631d8d4be0474d2db0209f6a

      SHA256

      ed11b837b67ecefc12a146ae6658f66aa1da21e11b7f575f8f580b1d2ec7d833

      SHA512

      e91c1678f8f528a5ba26b29756a7d841dc5fe46c3a016234f9aa222b69e994b15bf2b5d55e7cee54705d19dd17ec1e9cb3e18bcf7d5e96d6089e08dbcee1a480

    • memory/2876-24-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/2876-22-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/2876-28-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/2876-26-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/2876-25-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/2876-21-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/3932-2-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/3932-6-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/3932-7-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/3932-23-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/3932-1-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/3932-0-0x0000000075072000-0x0000000075073000-memory.dmp

      Filesize

      4KB

    • memory/3932-5-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB

    • memory/3932-4-0x0000000075072000-0x0000000075073000-memory.dmp

      Filesize

      4KB

    • memory/3932-3-0x0000000075070000-0x0000000075621000-memory.dmp

      Filesize

      5.7MB