Resubmissions

04/07/2023, 05:52

230704-gk5bqscg4w 7

04/07/2023, 05:38

230704-gbyslacf9s 7

Analysis

  • max time kernel
    1s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2023, 05:38

General

  • Target

    GTALICENSE-REGULAR.ttf

  • Size

    38KB

  • MD5

    c8aba349f0015b4e325dca9ee2fc33eb

  • SHA1

    324d3fca64ab722b6ddd08b18d25868eb889394f

  • SHA256

    e6331158fbcb0c0b65c8b1210873a0563525a66c2cf4f701f8e5ac626779c0ff

  • SHA512

    3e66317cdb882ed0b05aac3ea943a74393ab9489eccacfad3ae894e5ffd17e3e4c0ba7f063f018b53ab16db8f1642837825a6a302ed7805577443deae059b2d9

  • SSDEEP

    768:M6W+WsV3plNRqa8tJrMk1IsnvJGvYCL1LtbkWsV3plNRqa8tJrMk1IsnvJGvYCLs:MPk3pJz8JzjnEASVY3pJz8JzjnEASVlA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\GTALICENSE-REGULAR.ttf
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\System32\fontview.exe
      "C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\GTALICENSE-REGULAR.ttf
      2⤵
        PID:1364

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads