Analysis

  • max time kernel
    87s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 08:25

General

  • Target

    11db2c9ec6cda1d6124db111ba62706b.exe

  • Size

    94KB

  • MD5

    11db2c9ec6cda1d6124db111ba62706b

  • SHA1

    ac19503b7dc02e889730df84435e0992f7c31320

  • SHA256

    3d3533b4133a3c17c8b20e80b916e2f23929e85201660ffd7cdb933a189e77a1

  • SHA512

    4e7e4ecec27009c6958f340960c9b9a5d6d74f8df10befe327b52e1afbac76df9196737d05cea0d4039955e79becd436fb6048f5f9ebda96b4198a51369af7b9

  • SSDEEP

    1536:/fg+M2Y9oH+cpTKeyaI0Z/od8bDbRvU5yYeVYXrgITAGXBB3exYEjpepikFIy:/fgyY9oH+cTKGI0Z/oooeVYXrgI0GXW4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11db2c9ec6cda1d6124db111ba62706b.exe
    "C:\Users\Admin\AppData\Local\Temp\11db2c9ec6cda1d6124db111ba62706b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Cvz..bat" > nul 2> nul
      2⤵
        PID:2368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cvz..bat

      Filesize

      210B

      MD5

      5b29bce86407d7f6f6276008a70ee212

      SHA1

      2135023df42b18d42343bc991b9a8914e3660a20

      SHA256

      df8a44180f893320bde07fe27f3a2197edaeaf86ff2435ee0468ae6c66f36c8f

      SHA512

      4bc095572a680e6bf62e811070e90ba81cacf3cd77a867ee8a078218855adbf8bcedf980a2c2545cbfe1d765809c4966ec7c5e942d9b29ee6e396d5a1e027df8

    • memory/3764-0-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3764-1-0x0000000000500000-0x0000000000501000-memory.dmp

      Filesize

      4KB

    • memory/3764-2-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3764-3-0x00000000021F0000-0x000000000220B000-memory.dmp

      Filesize

      108KB

    • memory/3764-4-0x00000000021F0000-0x000000000220B000-memory.dmp

      Filesize

      108KB

    • memory/3764-6-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB