Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 17:05

General

  • Target

    9aaa34279e2c0a_JC.exe

  • Size

    44KB

  • MD5

    9aaa34279e2c0a6b45154789cd64b678

  • SHA1

    2d5554e69232e027f4e9e4e50a0c66e5f13a3ef5

  • SHA256

    281f08b016cc94c8b95367dfb0e9154423f2b3f919d4e0a1f36d4c69ccd0ccc2

  • SHA512

    b3fe922aef9080b761604db8c58541498041c80a5afabc01ba091f6fd7d72f8489c71257a63027ae48dd35946e65dbaf9c8ccef2e6b99593d1feed863f26e764

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4Uu6EIZPT:bIDOw9a0DwitDwIZr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aaa34279e2c0a_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9aaa34279e2c0a_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:4324

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          44KB

          MD5

          7f5165cd46a532aa4cf7b66e029dfb40

          SHA1

          01e37134fe6c89d0b14b92cd15e665c7dcfd3f56

          SHA256

          c5899a8b050bb5ee1b894dd20e71b49954bf73bb0ecb7fe83ef86e94517f973d

          SHA512

          27144d867ccbd2739105a6841c3412b2969efe65caab6ae7a62203f917a778767ebdb0c5e18c6e63e4ee5e13590c0d7323e774a2d12075f8fa468dd4ed3c195b

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          44KB

          MD5

          7f5165cd46a532aa4cf7b66e029dfb40

          SHA1

          01e37134fe6c89d0b14b92cd15e665c7dcfd3f56

          SHA256

          c5899a8b050bb5ee1b894dd20e71b49954bf73bb0ecb7fe83ef86e94517f973d

          SHA512

          27144d867ccbd2739105a6841c3412b2969efe65caab6ae7a62203f917a778767ebdb0c5e18c6e63e4ee5e13590c0d7323e774a2d12075f8fa468dd4ed3c195b

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          44KB

          MD5

          7f5165cd46a532aa4cf7b66e029dfb40

          SHA1

          01e37134fe6c89d0b14b92cd15e665c7dcfd3f56

          SHA256

          c5899a8b050bb5ee1b894dd20e71b49954bf73bb0ecb7fe83ef86e94517f973d

          SHA512

          27144d867ccbd2739105a6841c3412b2969efe65caab6ae7a62203f917a778767ebdb0c5e18c6e63e4ee5e13590c0d7323e774a2d12075f8fa468dd4ed3c195b

        • memory/2328-133-0x0000000002040000-0x0000000002046000-memory.dmp

          Filesize

          24KB

        • memory/2328-134-0x0000000002040000-0x0000000002046000-memory.dmp

          Filesize

          24KB

        • memory/2328-135-0x0000000002070000-0x0000000002076000-memory.dmp

          Filesize

          24KB

        • memory/2328-149-0x0000000002040000-0x0000000002046000-memory.dmp

          Filesize

          24KB

        • memory/4324-151-0x0000000000740000-0x0000000000746000-memory.dmp

          Filesize

          24KB

        • memory/4324-152-0x0000000000720000-0x0000000000726000-memory.dmp

          Filesize

          24KB