Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2023, 13:30

General

  • Target

    20f674237c97ebexe_JC.exe

  • Size

    31KB

  • MD5

    20f674237c97ebe14bd593711f7ad774

  • SHA1

    3a58785caf61de6f0a051eda0335cdae5e9284b0

  • SHA256

    2e267cf1433799d0085b8e8a9199cbe91ed917cb1e20ababa42b36e6ccd8aeee

  • SHA512

    d4b52e38f12a1e71d111f73119a723d1e8bb874a1f4647baaff471329ba0395f39b9dac75c27f3ead63076b8931c0c3011b87d4268c9659e4dfe732cc43c0cf6

  • SSDEEP

    384:bgCOR4uGLLQRcsdeQ72ngEUKK7YmE8jI0nrlwfjDU5ynuKK3B:bgCS4zYcgT/ENr0ryfjGquKK3B

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20f674237c97ebexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\20f674237c97ebexe_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:4480

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          31KB

          MD5

          a06fe89dc8b28b5dfe5b68f1ccb0e4ed

          SHA1

          9e63c3b05ea1ebc4a530dd41a86cc7196dc3e877

          SHA256

          34a153a188f031194892660a5efb861ea2ddcc399d877d86aabef51ef52ea9ac

          SHA512

          1992dc365f9dcd8bbf98f2adaa8b7ceff19fe04f9ed6f76d770e75c012c0121d302763a0ae16f17330597df105afee19507755d101f09ac60d9f906286b60083

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          31KB

          MD5

          a06fe89dc8b28b5dfe5b68f1ccb0e4ed

          SHA1

          9e63c3b05ea1ebc4a530dd41a86cc7196dc3e877

          SHA256

          34a153a188f031194892660a5efb861ea2ddcc399d877d86aabef51ef52ea9ac

          SHA512

          1992dc365f9dcd8bbf98f2adaa8b7ceff19fe04f9ed6f76d770e75c012c0121d302763a0ae16f17330597df105afee19507755d101f09ac60d9f906286b60083

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          31KB

          MD5

          a06fe89dc8b28b5dfe5b68f1ccb0e4ed

          SHA1

          9e63c3b05ea1ebc4a530dd41a86cc7196dc3e877

          SHA256

          34a153a188f031194892660a5efb861ea2ddcc399d877d86aabef51ef52ea9ac

          SHA512

          1992dc365f9dcd8bbf98f2adaa8b7ceff19fe04f9ed6f76d770e75c012c0121d302763a0ae16f17330597df105afee19507755d101f09ac60d9f906286b60083

        • memory/1500-133-0x0000000002110000-0x0000000002116000-memory.dmp

          Filesize

          24KB

        • memory/1500-134-0x0000000002110000-0x0000000002116000-memory.dmp

          Filesize

          24KB

        • memory/1500-135-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/4480-150-0x0000000001F90000-0x0000000001F96000-memory.dmp

          Filesize

          24KB

        • memory/4480-151-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB