Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 17:45

General

  • Target

    97446377168211exeexeexeex.exe

  • Size

    31KB

  • MD5

    9744637716821173b405ccf700e4425f

  • SHA1

    c59394c41bc9060b4e899ead1dc0c32016884d8a

  • SHA256

    36a31af3fbee43522fbf6a4aea740de46e1645133add8918bf1f31e98208f04b

  • SHA512

    f37b51a7cc81b56a477435201c2093cd22845e97a01897797a85e0ffd8f6dfc9f9aaee6872c3693417fa3071197172c9554a381217814ea8a857f2d522c4b0e3

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpju3FXobM:bAvJCYOOvbRPDEgXVFzpC3FXog

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      PID:4936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          31KB

          MD5

          fbec228140bd2fa1c21a646918e9029e

          SHA1

          a047128207be40065113a2933f5c79c13b65ab5e

          SHA256

          1cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c

          SHA512

          775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f

        • C:\Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          31KB

          MD5

          fbec228140bd2fa1c21a646918e9029e

          SHA1

          a047128207be40065113a2933f5c79c13b65ab5e

          SHA256

          1cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c

          SHA512

          775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f

        • C:\Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          31KB

          MD5

          fbec228140bd2fa1c21a646918e9029e

          SHA1

          a047128207be40065113a2933f5c79c13b65ab5e

          SHA256

          1cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c

          SHA512

          775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f

        • memory/2864-133-0x00000000020F0000-0x00000000020F6000-memory.dmp

          Filesize

          24KB

        • memory/2864-134-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB