Analysis

  • max time kernel
    127s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2023 19:19

General

  • Target

    Scarab.exe

  • Size

    88.7MB

  • MD5

    d686d4e45653e4c407cdd05989dcb298

  • SHA1

    c45dd624dc66df6dd38c2fd2c88b048242551881

  • SHA256

    19a0cbff33c56822aa0f148d9895a259da6043cf6c415c55752b8a0cee264e95

  • SHA512

    ed88cdaa089fd8b75eb74f1583488e78c4fe86014a4a0af980c90e97edaa929be3d590ac652b2ece2b5d6b7d73c49a8dcac1ac5d9228bee4da2d3f0c4d9d5c03

  • SSDEEP

    786432:Ed0w8valRKJIPTwZofD53ludMnCCBRuMGyj6l:EdYilRKQTb4KCyuMGB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Scarab.exe
    "C:\Users\Admin\AppData\Local\Temp\Scarab.exe"
    1⤵
    • Checks computer location settings
    PID:4144

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4144-133-0x0000000180000000-0x0000000180A20000-memory.dmp
    Filesize

    10.1MB

  • memory/4144-136-0x000001C950CE0000-0x000001C950CF6000-memory.dmp
    Filesize

    88KB

  • memory/4144-139-0x000001C972E30000-0x000001C972E42000-memory.dmp
    Filesize

    72KB

  • memory/4144-145-0x000001C950D10000-0x000001C950D1E000-memory.dmp
    Filesize

    56KB

  • memory/4144-142-0x000001C972EB0000-0x000001C972EF0000-memory.dmp
    Filesize

    256KB

  • memory/4144-148-0x000001C972E80000-0x000001C972EA1000-memory.dmp
    Filesize

    132KB

  • memory/4144-152-0x000001C973240000-0x000001C973248000-memory.dmp
    Filesize

    32KB

  • memory/4144-155-0x000001C973300000-0x000001C97330D000-memory.dmp
    Filesize

    52KB

  • memory/4144-158-0x000001C973350000-0x000001C97338C000-memory.dmp
    Filesize

    240KB

  • memory/4144-161-0x000001C973700000-0x000001C973713000-memory.dmp
    Filesize

    76KB

  • memory/4144-164-0x000001C973760000-0x000001C97379E000-memory.dmp
    Filesize

    248KB

  • memory/4144-167-0x000001C973830000-0x000001C9738B2000-memory.dmp
    Filesize

    520KB

  • memory/4144-170-0x000001C9732F0000-0x000001C9732F5000-memory.dmp
    Filesize

    20KB

  • memory/4144-173-0x000001C9752D0000-0x000001C975333000-memory.dmp
    Filesize

    396KB

  • memory/4144-176-0x000001C975B60000-0x000001C976379000-memory.dmp
    Filesize

    8.1MB

  • memory/4144-179-0x000001C9737A0000-0x000001C9737CA000-memory.dmp
    Filesize

    168KB

  • memory/4144-182-0x000001C975340000-0x000001C975347000-memory.dmp
    Filesize

    28KB

  • memory/4144-185-0x000001C975420000-0x000001C975429000-memory.dmp
    Filesize

    36KB

  • memory/4144-188-0x000001C975790000-0x000001C9758A4000-memory.dmp
    Filesize

    1.1MB

  • memory/4144-191-0x000001C9758B0000-0x000001C975952000-memory.dmp
    Filesize

    648KB

  • memory/4144-194-0x000001C9756C0000-0x000001C975701000-memory.dmp
    Filesize

    260KB