Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2023 15:15
Behavioral task
behavioral1
Sample
Scarabexe.exe
Resource
win7-20230703-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Scarabexe.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
Scarabexe.exe
-
Size
88.9MB
-
MD5
dfa1b92eac98e279cefd8012073c9772
-
SHA1
03d9c700a4dc6215c859ce50840eb0a146f09dce
-
SHA256
95df19643309ab51ae52853aac0599e912d3505eb1d5ca90f244f7d8c01d61ed
-
SHA512
6d625fd9fdae22b0d3279b00f819146cd31c736487569aae21441fec612f5d9621e6adb07d0e972f7229bb043c875ca83c87c7ffb9ec0dc86a1922f0e807bcef
-
SSDEEP
786432:M7Ug6CCerF/P1Q6nEL/t2zT/Ly/V5jiVaoXnRPGyY6E:eZVRtQ6EL/t2zTQ5pOPGr
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Scarabexe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation Scarabexe.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4908-133-0x0000000180000000-0x0000000180A22000-memory.dmpFilesize
10.1MB
-
memory/4908-136-0x000001F571E50000-0x000001F571E5D000-memory.dmpFilesize
52KB
-
memory/4908-139-0x000001F5725D0000-0x000001F5725E6000-memory.dmpFilesize
88KB
-
memory/4908-142-0x000001F572720000-0x000001F572732000-memory.dmpFilesize
72KB
-
memory/4908-145-0x000001F572790000-0x000001F5727D0000-memory.dmpFilesize
256KB
-
memory/4908-148-0x000001F571E80000-0x000001F571E8E000-memory.dmpFilesize
56KB
-
memory/4908-151-0x000001F5727D0000-0x000001F5727F1000-memory.dmpFilesize
132KB
-
memory/4908-154-0x000001F572B40000-0x000001F572B48000-memory.dmpFilesize
32KB
-
memory/4908-157-0x000001F572C50000-0x000001F572C8C000-memory.dmpFilesize
240KB
-
memory/4908-160-0x000001F573000000-0x000001F573013000-memory.dmpFilesize
76KB
-
memory/4908-163-0x000001F573060000-0x000001F57309E000-memory.dmpFilesize
248KB
-
memory/4908-166-0x000001F573130000-0x000001F5731B2000-memory.dmpFilesize
520KB
-
memory/4908-169-0x000001F572C30000-0x000001F572C35000-memory.dmpFilesize
20KB
-
memory/4908-172-0x000001F574BD0000-0x000001F574C33000-memory.dmpFilesize
396KB
-
memory/4908-175-0x000001F575460000-0x000001F575C7C000-memory.dmpFilesize
8.1MB
-
memory/4908-178-0x000001F5730E0000-0x000001F57310A000-memory.dmpFilesize
168KB
-
memory/4908-181-0x000001F5730A0000-0x000001F5730A7000-memory.dmpFilesize
28KB
-
memory/4908-184-0x000001F574E00000-0x000001F574E09000-memory.dmpFilesize
36KB
-
memory/4908-187-0x000001F5750D0000-0x000001F5751E4000-memory.dmpFilesize
1.1MB
-
memory/4908-190-0x000001F5751F0000-0x000001F575292000-memory.dmpFilesize
648KB
-
memory/4908-193-0x000001F574FF0000-0x000001F575031000-memory.dmpFilesize
260KB