Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 14:53
Static task
static1
Behavioral task
behavioral1
Sample
181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe
Resource
win10v2004-20241007-en
General
-
Target
181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe
-
Size
416KB
-
MD5
5a07735338f03f43aa20a064f3e23fd4
-
SHA1
024749ae320d59dc8b90b2d5d95e40d90929fcdc
-
SHA256
181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a
-
SHA512
0ec4ff12a58953e6b8e913231bfb2f8581eed7a4fa0dff29bf81eb9c5472508bc4f026293414ac50f7596799d547fb6edd6082172dbc2c87027f6b7e8b26b86b
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU78:ITNYrnE3bm/CiejewY5v9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe -
Executes dropped EXE 1 IoCs
pid Process 4192 ximo2ubzn1i.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4192 3224 181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe 86 PID 3224 wrote to memory of 4192 3224 181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe 86 PID 3224 wrote to memory of 4192 3224 181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe 86 PID 4192 wrote to memory of 5012 4192 ximo2ubzn1i.exe 90 PID 4192 wrote to memory of 5012 4192 ximo2ubzn1i.exe 90 PID 4192 wrote to memory of 5012 4192 ximo2ubzn1i.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe"C:\Users\Admin\AppData\Local\Temp\181b63e57b712d3d3b0a137cde1728a23a06ceda7bebd3b7e7e83c5d7406f46a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:5012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5991144f736ae78014f29ee2cb052c590
SHA12aa6577f9f897613bc0f09814aef1dca577c07c6
SHA256a634e7947ad1f2f2b3c46080d68bbc4df36e39170962f7469f3f31a08ca612b7
SHA5129c5023bdf2f32e22cc3a7c1ad5cb51742d136a944fe5b93f5ca99f5068a5835d0282a88619f65dd214fceb9f8b211983f785dab3a2e7f19a881419adedf30028