Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 16:43

General

  • Target

    2e0d91d2f53c8972b85474a0af5a4ccd.exe

  • Size

    835KB

  • MD5

    2e0d91d2f53c8972b85474a0af5a4ccd

  • SHA1

    579424294f6b61994420553324262fa870122c28

  • SHA256

    59a0e7d0bfcc51a30a03d8e593efc404c6c80293e8f130f34122a4fb2bcf3103

  • SHA512

    d254b1b4a448840ab612c6ab4b370f519a00825988c8d9f61427a17cd847b884563d2209d01fd9d5729f381fcfc8bc51cca8450b5ea631a8b415c86e7910785e

  • SSDEEP

    12288:94xkDWn1noBIR2ZWyJn5hKaPysbikwlc4FToFu8SMr23:9UpnfnyMaPysbiDO4ZoFu/v

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e0d91d2f53c8972b85474a0af5a4ccd.exe
    "C:\Users\Admin\AppData\Local\Temp\2e0d91d2f53c8972b85474a0af5a4ccd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE
      "C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE
        "C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"
        3⤵
          PID:3148

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE

      Filesize

      684KB

      MD5

      31f2b901f6b937a3f54c3abe9e867349

      SHA1

      69da344d610f13cbef655ca6a2b378f60dd3071f

      SHA256

      de252d3111ed1bec4fed91300559fe0513f4f6295776f4778c3a053db13ad17b

      SHA512

      74dbad43d0ecd6e03b433fb928bd85b961bdb2a2606bf442586d5b07b1bfb01f9a804f05cac92556ee34f895c8b6d7b4485369930476ef554f71be7a9aee06c2

    • memory/2212-8-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB