Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2023, 16:58

General

  • Target

    40a0682397545bexeexeexeex.exe

  • Size

    31KB

  • MD5

    40a0682397545ba8ffdd38bfbc635ed2

  • SHA1

    2470259827feed24caa18564f3a99bb041c0a9c9

  • SHA256

    82bc2a1d9565777f67b7f0428c059b0870465abe47aa59f067ce8414fca9ba76

  • SHA512

    9c5598ac89d46c27f4feaa9b56c7e4b8a59bd320a95e38061449a972b8b716d116cc0ce2c2402431bd5977a0eafe42e68da3de0ae4eca10ae63403f19614510f

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpjum:bAvJCYOOvbRPDEgXVFzpCm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40a0682397545bexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\40a0682397545bexeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    9f4c6ca9ff366bbe49c167acdc6202f4

    SHA1

    a7367cf12cc645b110f33b7b91a32a7235f15a19

    SHA256

    6cf2f2f518258b2ea5fbb0f6fb4f5f03d4685ba3442589c481c92e20326243ef

    SHA512

    344b0c228fbafb55589649c4c8bc69a91210f04bb8f026881ffbecdd487d94d546ee8a9092db60739b892b361a023c94cb63a65ee4bff449794da44302ed2f91

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    9f4c6ca9ff366bbe49c167acdc6202f4

    SHA1

    a7367cf12cc645b110f33b7b91a32a7235f15a19

    SHA256

    6cf2f2f518258b2ea5fbb0f6fb4f5f03d4685ba3442589c481c92e20326243ef

    SHA512

    344b0c228fbafb55589649c4c8bc69a91210f04bb8f026881ffbecdd487d94d546ee8a9092db60739b892b361a023c94cb63a65ee4bff449794da44302ed2f91

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    9f4c6ca9ff366bbe49c167acdc6202f4

    SHA1

    a7367cf12cc645b110f33b7b91a32a7235f15a19

    SHA256

    6cf2f2f518258b2ea5fbb0f6fb4f5f03d4685ba3442589c481c92e20326243ef

    SHA512

    344b0c228fbafb55589649c4c8bc69a91210f04bb8f026881ffbecdd487d94d546ee8a9092db60739b892b361a023c94cb63a65ee4bff449794da44302ed2f91

  • memory/4808-133-0x0000000000680000-0x0000000000686000-memory.dmp

    Filesize

    24KB

  • memory/4808-134-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB