Analysis
-
max time kernel
127s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2023 19:19
Behavioral task
behavioral1
Sample
Scarab.exe
Resource
win7-20230621-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Scarab.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
Scarab.exe
-
Size
88.7MB
-
MD5
d686d4e45653e4c407cdd05989dcb298
-
SHA1
c45dd624dc66df6dd38c2fd2c88b048242551881
-
SHA256
19a0cbff33c56822aa0f148d9895a259da6043cf6c415c55752b8a0cee264e95
-
SHA512
ed88cdaa089fd8b75eb74f1583488e78c4fe86014a4a0af980c90e97edaa929be3d590ac652b2ece2b5d6b7d73c49a8dcac1ac5d9228bee4da2d3f0c4d9d5c03
-
SSDEEP
786432:Ed0w8valRKJIPTwZofD53ludMnCCBRuMGyj6l:EdYilRKQTb4KCyuMGB
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Scarab.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-922299981-3641064733-3870770889-1000\Control Panel\International\Geo\Nation Scarab.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4144-133-0x0000000180000000-0x0000000180A20000-memory.dmpFilesize
10.1MB
-
memory/4144-136-0x000001C950CE0000-0x000001C950CF6000-memory.dmpFilesize
88KB
-
memory/4144-139-0x000001C972E30000-0x000001C972E42000-memory.dmpFilesize
72KB
-
memory/4144-145-0x000001C950D10000-0x000001C950D1E000-memory.dmpFilesize
56KB
-
memory/4144-142-0x000001C972EB0000-0x000001C972EF0000-memory.dmpFilesize
256KB
-
memory/4144-148-0x000001C972E80000-0x000001C972EA1000-memory.dmpFilesize
132KB
-
memory/4144-152-0x000001C973240000-0x000001C973248000-memory.dmpFilesize
32KB
-
memory/4144-155-0x000001C973300000-0x000001C97330D000-memory.dmpFilesize
52KB
-
memory/4144-158-0x000001C973350000-0x000001C97338C000-memory.dmpFilesize
240KB
-
memory/4144-161-0x000001C973700000-0x000001C973713000-memory.dmpFilesize
76KB
-
memory/4144-164-0x000001C973760000-0x000001C97379E000-memory.dmpFilesize
248KB
-
memory/4144-167-0x000001C973830000-0x000001C9738B2000-memory.dmpFilesize
520KB
-
memory/4144-170-0x000001C9732F0000-0x000001C9732F5000-memory.dmpFilesize
20KB
-
memory/4144-173-0x000001C9752D0000-0x000001C975333000-memory.dmpFilesize
396KB
-
memory/4144-176-0x000001C975B60000-0x000001C976379000-memory.dmpFilesize
8.1MB
-
memory/4144-179-0x000001C9737A0000-0x000001C9737CA000-memory.dmpFilesize
168KB
-
memory/4144-182-0x000001C975340000-0x000001C975347000-memory.dmpFilesize
28KB
-
memory/4144-185-0x000001C975420000-0x000001C975429000-memory.dmpFilesize
36KB
-
memory/4144-188-0x000001C975790000-0x000001C9758A4000-memory.dmpFilesize
1.1MB
-
memory/4144-191-0x000001C9758B0000-0x000001C975952000-memory.dmpFilesize
648KB
-
memory/4144-194-0x000001C9756C0000-0x000001C975701000-memory.dmpFilesize
260KB