Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 19:55

General

  • Target

    0f253cb77c46f7ed50c3f9cefc6a04af.exe

  • Size

    61KB

  • MD5

    0f253cb77c46f7ed50c3f9cefc6a04af

  • SHA1

    5b2c1c5e9f509e5cb89a0d922b7e2eb96fd54058

  • SHA256

    dc076be8b042f88f2dc7f9468372d373b159df2b8595879dc9a0a7d70b2d2a2a

  • SHA512

    3e185166d6fe60f6333c31dca9d71b087542512001bc474e0dbfac9ec32c56302fdedf9777828ee6b2f4b7d937487064026851dcb38a758a123097b68e9d80bb

  • SSDEEP

    768:ig1eR9+KpvS3p2v3yrVKbKGVit4sgSSpwlXRJVSvsSQ+oPZIxyFNFzTami3pdWSG:U03p2/H1dSgw3fSaIxE3amiH1Di

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f253cb77c46f7ed50c3f9cefc6a04af.exe
    "C:\Users\Admin\AppData\Local\Temp\0f253cb77c46f7ed50c3f9cefc6a04af.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
      "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe" end
      2⤵
      • Executes dropped EXE
      PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe

    Filesize

    61KB

    MD5

    0f253cb77c46f7ed50c3f9cefc6a04af

    SHA1

    5b2c1c5e9f509e5cb89a0d922b7e2eb96fd54058

    SHA256

    dc076be8b042f88f2dc7f9468372d373b159df2b8595879dc9a0a7d70b2d2a2a

    SHA512

    3e185166d6fe60f6333c31dca9d71b087542512001bc474e0dbfac9ec32c56302fdedf9777828ee6b2f4b7d937487064026851dcb38a758a123097b68e9d80bb

  • memory/2464-9-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3680-8-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB