Analysis

  • max time kernel
    94s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2025, 00:30

General

  • Target

    75a2da8f874dd90287624204492864519180c8a8f9ed428c0032b8aca3f9b288.exe

  • Size

    417KB

  • MD5

    8d15d03e9e529978c300e443915755d1

  • SHA1

    8e217f266fb1829e65a9364505cc61e10186d903

  • SHA256

    75a2da8f874dd90287624204492864519180c8a8f9ed428c0032b8aca3f9b288

  • SHA512

    0b1d6df9405be3df0ae6a6dfc87fa5591398b9febb892a5978d9937600b6aa47215fbc06870355d6175e95ab58dc67f4d17d259d565f5a875631c9d0b3282777

  • SSDEEP

    6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUx:ITNYrnE3bm/CiejewY5vs

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75a2da8f874dd90287624204492864519180c8a8f9ed428c0032b8aca3f9b288.exe
    "C:\Users\Admin\AppData\Local\Temp\75a2da8f874dd90287624204492864519180c8a8f9ed428c0032b8aca3f9b288.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe
      "C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
          PID:3304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe

      Filesize

      417KB

      MD5

      2f8ae4cd2709c24f66a2d8ca45d63990

      SHA1

      a6894dd53a92da1434ef029d4f04fadf1494f57e

      SHA256

      ab1922de1b56edebdab964e5afe79261566956401ffe07632980b11b25b722d2

      SHA512

      a36b79d75165d0dba5d8c60a819bdef4829900828676c99d6155462f7b94297ca59b0fc0cea94601c97f3e5ecba8dd9e347abefc4810ac051f31f98637ee3427

    • memory/1352-6-0x0000000005A30000-0x0000000005A6C000-memory.dmp

      Filesize

      240KB

    • memory/1352-2-0x0000000005AA0000-0x0000000006044000-memory.dmp

      Filesize

      5.6MB

    • memory/1352-3-0x0000000005590000-0x0000000005622000-memory.dmp

      Filesize

      584KB

    • memory/1352-5-0x0000000005720000-0x000000000572A000-memory.dmp

      Filesize

      40KB

    • memory/1352-4-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB

    • memory/1352-0-0x00000000751BE000-0x00000000751BF000-memory.dmp

      Filesize

      4KB

    • memory/1352-1-0x0000000000C50000-0x0000000000CBE000-memory.dmp

      Filesize

      440KB

    • memory/1352-20-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB

    • memory/4848-21-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB

    • memory/4848-22-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB

    • memory/4848-23-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB

    • memory/4848-25-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB