Analysis

  • max time kernel
    0s
  • max time network
    91s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:52

General

  • Target

    1214178fc43657a53bc7487df47ab56b.exe

  • Size

    115KB

  • MD5

    1214178fc43657a53bc7487df47ab56b

  • SHA1

    492d3a326c20454698138ddd2b4df1cbebaa5e2a

  • SHA256

    4d050ad0268e4ba9ed482f8c4835a52549364d282e5249fc72dd93970a46de0d

  • SHA512

    28a14ccae34e7a4a8f41691357d6da0a782a8fa9bbd6b88fd003ece1121ac8f4ddd0ee64923b67bd1e862c6164d72d8e57e1772136f51e798a598eadbbcd110a

  • SSDEEP

    1536:UkoAzrk0MkJaG3Tmi8eCWWAu4+y268gtZYL86P7EZ3c:JRzrnMZG318eCWlkyB86ZY46wO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1214178fc43657a53bc7487df47ab56b.exe
    "C:\Users\Admin\AppData\Local\Temp\1214178fc43657a53bc7487df47ab56b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Enf..bat" > nul 2> nul
      2⤵
        PID:3736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Enf..bat

      Filesize

      210B

      MD5

      408297723d37c244a62f239f062f295f

      SHA1

      4ba7f6b546e8d4def80401b057c8fe2e5dc95053

      SHA256

      45129f7fb2015a4f9d53cd1cbf96b509ec33a13d2075a780be07f64fe80d3051

      SHA512

      bb523376ce9e16a1eaac7c18fd9b4920b74721b1577d298d99a77f50b471424ac5034f74f61b2194032564d68c33b3cd01fc58e4dd2f602db02e508cb4394ab5

    • memory/1476-0-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1476-2-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1476-1-0x0000000000190000-0x00000000001A2000-memory.dmp

      Filesize

      72KB

    • memory/1476-4-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB