Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 08:49

General

  • Target

    131014567b22f978d7cf2c98e99ac3c4.exe

  • Size

    115KB

  • MD5

    131014567b22f978d7cf2c98e99ac3c4

  • SHA1

    0aa63be7d899815eb45d1b1b6d546889e4107ecf

  • SHA256

    8c5001c8b7593d0ab8931204a1bf3ce02de5610d87753a3ef38cf944e2bd7a5e

  • SHA512

    133868c050006e4b1b2ff9c0de6d50d4f516a40bb886bf9d79cc9bb952d4b9dfbdbfc2f456e64248eac39bdf64b156952f23b7fc97ea105bb340c31bef239e0a

  • SSDEEP

    1536:UkoAzrk0MkJaG3Tmi8eCWWAu4+y268gtZYL86X7EZ3c:JRzrnMZG318eCWlkyB86ZY46YO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\131014567b22f978d7cf2c98e99ac3c4.exe
    "C:\Users\Admin\AppData\Local\Temp\131014567b22f978d7cf2c98e99ac3c4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Tkv..bat" > nul 2> nul
      2⤵
        PID:1476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Tkv..bat

      Filesize

      210B

      MD5

      47a3f7aad49ff2489a95c6584a2ebd53

      SHA1

      4d43481e71009289cf591d4fb01787ea690f3d56

      SHA256

      bc28c19ce18ae7ca243c79e3ee0a02bc1b80cc8e1e7987b570744d3d6cd297d8

      SHA512

      52de037f8990e4f3df615d0f8d0399c36b2bba69cbe9649c1ab9f83c0e15642496b06f886d28d0a94ecd8d2aefebe00e1aa12251e6d6596bdfe8ebf9420467c6

    • memory/1824-0-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1824-1-0x0000000000B80000-0x0000000000B92000-memory.dmp

      Filesize

      72KB

    • memory/1824-2-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1824-4-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB