Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 00:08

General

  • Target

    88db41a55b6b0ec965cf7c4bc2559d7f02e1ee2829c66bdbf9f1699bca19412d.exe

  • Size

    8.4MB

  • MD5

    067ecf759bb4a87d2d7e00e4d89a2a04

  • SHA1

    feef5894b3f1e141eb3e1043291a31f82e98e695

  • SHA256

    88db41a55b6b0ec965cf7c4bc2559d7f02e1ee2829c66bdbf9f1699bca19412d

  • SHA512

    fa434b07e732b146295a8f56f545427e32f4f4db0e30ac92bb4168160246a4426f647d919fedbe006abc22e9864396ea34259f6b50e8997ad0fdc3637b3562a2

  • SSDEEP

    196608:gZghD8OhetZy60ugFA7L7cz+gzaQe+kx3uTXa/ip3:giB8Ohet4Pecz+gUuTXDp

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88db41a55b6b0ec965cf7c4bc2559d7f02e1ee2829c66bdbf9f1699bca19412d.exe
    "C:\Users\Admin\AppData\Local\Temp\88db41a55b6b0ec965cf7c4bc2559d7f02e1ee2829c66bdbf9f1699bca19412d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\AppData\Local\Temp\Sigmakey_Fastboot_flasher.exe
      "C:\Users\Admin\AppData\Local\Temp\Sigmakey_Fastboot_flasher.exe"
      2⤵
      • Executes dropped EXE
      PID:1084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Sigmakey_Fastboot_flasher.exe

          Filesize

          6.8MB

          MD5

          64fb4fab159a6f933654c59dfe06a3e5

          SHA1

          ae491334820573f6d808233c638652643b7e0337

          SHA256

          1163972463dac9cae7018fafd0ba6adce7278d127539fbdaa5cbaf34588e3d2c

          SHA512

          aa9dcaa0356c900efeff598b1eeb55709e1452addb62a3f823d073a7eed1c97f165bfdbd9861ae4d4498c9d8785eabc36f3035eec3ac705a08ec714f34343424

        • C:\Users\Admin\AppData\Local\Temp\Sigmakey_Fastboot_flasher.exe

          Filesize

          6.8MB

          MD5

          64fb4fab159a6f933654c59dfe06a3e5

          SHA1

          ae491334820573f6d808233c638652643b7e0337

          SHA256

          1163972463dac9cae7018fafd0ba6adce7278d127539fbdaa5cbaf34588e3d2c

          SHA512

          aa9dcaa0356c900efeff598b1eeb55709e1452addb62a3f823d073a7eed1c97f165bfdbd9861ae4d4498c9d8785eabc36f3035eec3ac705a08ec714f34343424

        • memory/1084-11-0x0000000000400000-0x0000000000DB4000-memory.dmp

          Filesize

          9.7MB