Analysis

  • max time kernel
    134s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2023 18:10

General

  • Target

    Mod Installer/Scarab.exe

  • Size

    88.8MB

  • MD5

    a093c0d9c2392def8a9f8524f337b68f

  • SHA1

    69698aa863f12fae02d19fc033a52e4f904e900d

  • SHA256

    2ba106e57bacbce734de86ac9deab2a763087ca38291b5298130736b1474236f

  • SHA512

    7e3ae3120ae28ae3ce8691904d45017d561cd53459816fa94e6d4f0b9533b9d90d2c556e42cd2daf9faa43c46284e8193c9604855a73daa9c8441b70875483cd

  • SSDEEP

    786432:X2OYL67WBlefpvpqjTFK7TkLy/kkPZSaXnRPGyY6+:XiL6qiRvsjTFK7TyjoPG3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mod Installer\Scarab.exe
    "C:\Users\Admin\AppData\Local\Temp\Mod Installer\Scarab.exe"
    1⤵
    • Checks computer location settings
    PID:4756

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4756-133-0x0000000180000000-0x0000000180A23000-memory.dmp
    Filesize

    10.1MB

  • memory/4756-136-0x000001EB864D0000-0x000001EB864DD000-memory.dmp
    Filesize

    52KB

  • memory/4756-139-0x000001EBA8520000-0x000001EBA8536000-memory.dmp
    Filesize

    88KB

  • memory/4756-142-0x000001EBA8650000-0x000001EBA8662000-memory.dmp
    Filesize

    72KB

  • memory/4756-145-0x000001EBA86C0000-0x000001EBA8700000-memory.dmp
    Filesize

    256KB

  • memory/4756-148-0x000001EB864E0000-0x000001EB864EE000-memory.dmp
    Filesize

    56KB

  • memory/4756-151-0x000001EBA8700000-0x000001EBA8721000-memory.dmp
    Filesize

    132KB

  • memory/4756-154-0x000001EBA8A70000-0x000001EBA8A78000-memory.dmp
    Filesize

    32KB

  • memory/4756-157-0x000001EBA8B50000-0x000001EBA8B8C000-memory.dmp
    Filesize

    240KB

  • memory/4756-160-0x000001EBA8F00000-0x000001EBA8F13000-memory.dmp
    Filesize

    76KB

  • memory/4756-163-0x000001EBA8F70000-0x000001EBA8FAE000-memory.dmp
    Filesize

    248KB

  • memory/4756-166-0x000001EBA9050000-0x000001EBA90D2000-memory.dmp
    Filesize

    520KB

  • memory/4756-169-0x000001EBA8B40000-0x000001EBA8B45000-memory.dmp
    Filesize

    20KB

  • memory/4756-172-0x000001EBAAAF0000-0x000001EBAAB53000-memory.dmp
    Filesize

    396KB

  • memory/4756-175-0x000001EBAB390000-0x000001EBABBAC000-memory.dmp
    Filesize

    8.1MB

  • memory/4756-178-0x000001EBA8FB0000-0x000001EBA8FDA000-memory.dmp
    Filesize

    168KB

  • memory/4756-181-0x000001EBA9040000-0x000001EBA9047000-memory.dmp
    Filesize

    28KB

  • memory/4756-184-0x000001EBAAD00000-0x000001EBAAD09000-memory.dmp
    Filesize

    36KB

  • memory/4756-187-0x000001EBAAFB0000-0x000001EBAB0C4000-memory.dmp
    Filesize

    1.1MB

  • memory/4756-190-0x000001EBAB0D0000-0x000001EBAB172000-memory.dmp
    Filesize

    648KB

  • memory/4756-193-0x000001EBAAEE0000-0x000001EBAAF21000-memory.dmp
    Filesize

    260KB

  • memory/4756-196-0x000001EBAC270000-0x000001EBAC325000-memory.dmp
    Filesize

    724KB