Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 08:09

General

  • Target

    111d0ac8852c76f41ce3f5da4f654503.exe

  • Size

    103KB

  • MD5

    111d0ac8852c76f41ce3f5da4f654503

  • SHA1

    f7d4264e48d95d8427b552df2ba334498c699bc9

  • SHA256

    42d7ae0c35e6da95bfc25bcd438de93771fd95a3a0218506882b794024852895

  • SHA512

    529b6d7516a91a4c6e4a936b569861bae4b9359d4f79bd2d8398cde13376e100e7996b5c60824530fd782d97c0e476c817b0e872c84c1ad8fd813f6936928ea0

  • SSDEEP

    1536:CqJW3IBqpAXmqmuyBXSu6omC/w539lGzNP5x2d5shU73Y:dJW38/4EdVGNxxjhULY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\111d0ac8852c76f41ce3f5da4f654503.exe
    "C:\Users\Admin\AppData\Local\Temp\111d0ac8852c76f41ce3f5da4f654503.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Hbj..bat" > nul 2> nul
      2⤵
        PID:3524

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Hbj..bat

            Filesize

            210B

            MD5

            b52b9c8e1c4ec53f2be3bcd97678e9ad

            SHA1

            4d5dacf066710d998ea951319550c1d07e933686

            SHA256

            e63f8a2a2aa3449261925ab3d00c49ac81a05d787359835b8115abd35ec3d30a

            SHA512

            22aa6814fbe66f5700933760bc224902d5408989cdcff6caac25f570e01bd8a59646b4965f6dae44e889401c8ecc4429c5d887e4712e25ba8ffdea93a495fd4f

          • memory/2912-0-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2912-1-0x00000000009C0000-0x00000000009C9000-memory.dmp

            Filesize

            36KB

          • memory/2912-2-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2912-4-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB