Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2023, 10:54

General

  • Target

    0e15ed307cbc92e5e82430838fd58715.exe

  • Size

    66KB

  • MD5

    0e15ed307cbc92e5e82430838fd58715

  • SHA1

    fae695e410dcdd039be00523546bdcd2791dfa6e

  • SHA256

    f2a56e6c13431a6943b369a194dc38fff362e6cc9608f88e6171571bd0b25c24

  • SHA512

    656a5cc77ccccfc9651d61f88be06e55937eb106e74779e759628c62c38ad258ec1fe1ee4255860b2dff8fa5dab926230819f8527353eff34a4d9088f7ef7304

  • SSDEEP

    768:MiPPTYiNCSAetFpamkQzXmRItONlg8PyNUMsFYsktATb6jzUi2r:M0FptJiNng8dViN0m/2r

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e15ed307cbc92e5e82430838fd58715.exe
    "C:\Users\Admin\AppData\Local\Temp\0e15ed307cbc92e5e82430838fd58715.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Users\Admin\AppData\Local\Temp\hromi.exe
      "C:\Users\Admin\AppData\Local\Temp\hromi.exe"
      2⤵
      • Executes dropped EXE
      PID:4308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hromi.exe

    Filesize

    66KB

    MD5

    bb6f00bb7597c1cb966d16034ea4c4cb

    SHA1

    a10d6f55fa501fd12816ca8234c2c2cc6ab8e87b

    SHA256

    06124c81a8f5f4687c1c4d97cad7ac5e1a80e82458eab1dab03116c92b38eb0c

    SHA512

    15bc495d93c7866b0617dff546f2882c32d4fa6ce4086d53660896ab666742964a8ae867a0c0a79f84cbbbac909aea0cdaa7d2d972934867adb473239fd9ef57

  • memory/4808-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4808-9-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB