Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2023, 10:47

General

  • Target

    f272b03133da56exeexeexeex.exe

  • Size

    57KB

  • MD5

    f272b03133da561c9f6a447a3f560e3c

  • SHA1

    4bc42f76406bb1e61b4a7eda5e35362770c01839

  • SHA256

    1686a11aa5ad4d6eaa42786a1ec1323d78e8469d43b99efafa7fcd7e6fe8ffc4

  • SHA512

    ce7a2fbd39011f98e4663d6f25dc7e44059576d55a60ce2b7db192f2c79bd44037899b5bafa588c610cee62a4d7e3c202acba896a254be024a72f0b3cf87020d

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8lB4dCOBy/cMFqeo9e1dWSC9:ZzFbxmLPWQMOtEvwDpj38lD/cMAPOE9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f272b03133da56exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\f272b03133da56exeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:976

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          57KB

          MD5

          2c9b9d587fcb7a29105e89fd84801547

          SHA1

          69e598086a0b5b525999b85b3b624b7c37d653f6

          SHA256

          3c903c1c004f56b157927d609826259b257fc987d3345a95dd42ee509a7d678c

          SHA512

          ae63b833689b9e4ce80d39319a256da209dc1c0d15ee66f2f0547d7412f250d24ac8d325a36ffe5b3934d31ca27178b59777707931f5e71296e83c8331b2af78

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          57KB

          MD5

          2c9b9d587fcb7a29105e89fd84801547

          SHA1

          69e598086a0b5b525999b85b3b624b7c37d653f6

          SHA256

          3c903c1c004f56b157927d609826259b257fc987d3345a95dd42ee509a7d678c

          SHA512

          ae63b833689b9e4ce80d39319a256da209dc1c0d15ee66f2f0547d7412f250d24ac8d325a36ffe5b3934d31ca27178b59777707931f5e71296e83c8331b2af78

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          57KB

          MD5

          2c9b9d587fcb7a29105e89fd84801547

          SHA1

          69e598086a0b5b525999b85b3b624b7c37d653f6

          SHA256

          3c903c1c004f56b157927d609826259b257fc987d3345a95dd42ee509a7d678c

          SHA512

          ae63b833689b9e4ce80d39319a256da209dc1c0d15ee66f2f0547d7412f250d24ac8d325a36ffe5b3934d31ca27178b59777707931f5e71296e83c8331b2af78

        • C:\Users\Admin\AppData\Local\Temp\misids.exe

          Filesize

          315B

          MD5

          a34ac19f4afae63adc5d2f7bc970c07f

          SHA1

          a82190fc530c265aa40a045c21770d967f4767b8

          SHA256

          d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

          SHA512

          42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

        • memory/976-150-0x00000000006C0000-0x00000000006C6000-memory.dmp

          Filesize

          24KB

        • memory/3452-133-0x00000000005D0000-0x00000000005D6000-memory.dmp

          Filesize

          24KB

        • memory/3452-134-0x00000000005F0000-0x00000000005F6000-memory.dmp

          Filesize

          24KB

        • memory/3452-141-0x00000000004D0000-0x00000000004D3000-memory.dmp

          Filesize

          12KB