Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 16:56
Static task
static1
Behavioral task
behavioral1
Sample
fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe
Resource
win10v2004-20241007-en
General
-
Target
fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe
-
Size
280KB
-
MD5
bace252b49b68a0099f8ecdda382b250
-
SHA1
49c319ec9fdebe5e8d896a9825fe128bc6a29af9
-
SHA256
fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8
-
SHA512
85b88f965fc2f4c4e9bdf34a6846d696f5759d99a8c64db3487d5e9afbfcb8494fd05751361feeed309ea8834526cf83130a535f446b8afac5de9bef111e5ea0
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66f32:boSeGUA5YZazpXUmZhZ6f2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3932 wrote to memory of 2876 3932 fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe 97 PID 3932 wrote to memory of 2876 3932 fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe 97 PID 3932 wrote to memory of 2876 3932 fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe 97 PID 2876 wrote to memory of 1648 2876 a1punf5t2of.exe 98 PID 2876 wrote to memory of 1648 2876 a1punf5t2of.exe 98 PID 2876 wrote to memory of 1648 2876 a1punf5t2of.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe"C:\Users\Admin\AppData\Local\Temp\fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5171e926dc83e183d75ef0b8ade3365ea
SHA1fb78b9b1ca1e8786631d8d4be0474d2db0209f6a
SHA256ed11b837b67ecefc12a146ae6658f66aa1da21e11b7f575f8f580b1d2ec7d833
SHA512e91c1678f8f528a5ba26b29756a7d841dc5fe46c3a016234f9aa222b69e994b15bf2b5d55e7cee54705d19dd17ec1e9cb3e18bcf7d5e96d6089e08dbcee1a480