Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 14:53

General

  • Target

    181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe

  • Size

    416KB

  • MD5

    5a07735338f03f43aa20a064f3e23fd4

  • SHA1

    024749ae320d59dc8b90b2d5d95e40d90929fcdc

  • SHA256

    181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a

  • SHA512

    0ec4ff12a58953e6b8e913231bfb2f8581eed7a4fa0dff29bf81eb9c5472508bc4f026293414ac50f7596799d547fb6edd6082172dbc2c87027f6b7e8b26b86b

  • SSDEEP

    6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU78:ITNYrnE3bm/CiejewY5v9

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe
    "C:\Users\Admin\AppData\Local\Temp\181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe
      "C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
          PID:5012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe

      Filesize

      416KB

      MD5

      991144f736ae78014f29ee2cb052c590

      SHA1

      2aa6577f9f897613bc0f09814aef1dca577c07c6

      SHA256

      a634e7947ad1f2f2b3c46080d68bbc4df36e39170962f7469f3f31a08ca612b7

      SHA512

      9c5023bdf2f32e22cc3a7c1ad5cb51742d136a944fe5b93f5ca99f5068a5835d0282a88619f65dd214fceb9f8b211983f785dab3a2e7f19a881419adedf30028

    • memory/3224-6-0x0000000005380000-0x00000000053BC000-memory.dmp

      Filesize

      240KB

    • memory/3224-2-0x00000000055E0000-0x0000000005B84000-memory.dmp

      Filesize

      5.6MB

    • memory/3224-3-0x00000000050D0000-0x0000000005162000-memory.dmp

      Filesize

      584KB

    • memory/3224-4-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/3224-5-0x00000000052A0000-0x00000000052AA000-memory.dmp

      Filesize

      40KB

    • memory/3224-0-0x000000007468E000-0x000000007468F000-memory.dmp

      Filesize

      4KB

    • memory/3224-1-0x0000000000680000-0x00000000006EE000-memory.dmp

      Filesize

      440KB

    • memory/3224-20-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/4192-21-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/4192-22-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/4192-23-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/4192-25-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB