Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2023, 19:33

General

  • Target

    bd8f660ddd0e15exeexeexeex.exe

  • Size

    35KB

  • MD5

    bd8f660ddd0e15a97782c2583a389263

  • SHA1

    861b3ea36841878ed2187eb78b892967b229367b

  • SHA256

    4373efbf99afd99cbace1725912c7e045cc686872ec609df9df299108ba863cf

  • SHA512

    de866b59995804b9dcdc38f7301611812bfb81b83098b40b0b867c9b30ab82768c95900b5aec548258117da0a7c92b1379367a932109ec7fa5c10f2fd2870c32

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72DxLE:bgX4zYcgTEu6QOaryfjqDlC76LE

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd8f660ddd0e15exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\bd8f660ddd0e15exeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:740

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          35KB

          MD5

          0dc3502ebf5d839dae8f8b44086c9a2f

          SHA1

          ea8b221dbfc60b78835f0bdae6de353e0e064a37

          SHA256

          acf3331098a7ffbf643e57020589a6fbe6126d64f542adf6f1e9be7cd95db5ad

          SHA512

          8294820a3d22761e37239a9cd5227fbbbc62122f09f18fc355318ef9d8f03a7fae84044658f6bcb7d9673aa2094b3d6c4eb738c5460beecb84e044f9f134e754

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          35KB

          MD5

          0dc3502ebf5d839dae8f8b44086c9a2f

          SHA1

          ea8b221dbfc60b78835f0bdae6de353e0e064a37

          SHA256

          acf3331098a7ffbf643e57020589a6fbe6126d64f542adf6f1e9be7cd95db5ad

          SHA512

          8294820a3d22761e37239a9cd5227fbbbc62122f09f18fc355318ef9d8f03a7fae84044658f6bcb7d9673aa2094b3d6c4eb738c5460beecb84e044f9f134e754

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          35KB

          MD5

          0dc3502ebf5d839dae8f8b44086c9a2f

          SHA1

          ea8b221dbfc60b78835f0bdae6de353e0e064a37

          SHA256

          acf3331098a7ffbf643e57020589a6fbe6126d64f542adf6f1e9be7cd95db5ad

          SHA512

          8294820a3d22761e37239a9cd5227fbbbc62122f09f18fc355318ef9d8f03a7fae84044658f6bcb7d9673aa2094b3d6c4eb738c5460beecb84e044f9f134e754

        • memory/740-149-0x0000000002250000-0x0000000002256000-memory.dmp

          Filesize

          24KB

        • memory/1784-133-0x00000000020E0000-0x00000000020E6000-memory.dmp

          Filesize

          24KB

        • memory/1784-134-0x00000000021A0000-0x00000000021A6000-memory.dmp

          Filesize

          24KB