Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 16:23

General

  • Target

    2ccdcea5e295d5c53f048fc75d9cf2df.exe

  • Size

    692KB

  • MD5

    2ccdcea5e295d5c53f048fc75d9cf2df

  • SHA1

    f1059bb988cedc9823768b9944dc41660f56c7d5

  • SHA256

    1e98165b95c1176b4c7d513c50fcce00a13049802d174c5bbf102df48e8b3f35

  • SHA512

    9680db1fa6a4e11653840ddebdfb5392db5960ceccb18bfafe6b32b6753aa728b40c56322238a2526f0d1858ea49b061ada54ce38dac89792ff7b9c090d25cad

  • SSDEEP

    12288:I0TKvMYHM81VKILrxANM6Rtoc+Q+mzj6lFQFl1iWybtBGZzqSFF:BM1JNANRRG8zzj/lotBGZ+SFF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ccdcea5e295d5c53f048fc75d9cf2df.exe
    "C:\Users\Admin\AppData\Local\Temp\2ccdcea5e295d5c53f048fc75d9cf2df.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\az.exe
      "C:\Users\Admin\AppData\Local\Temp\az.exe"
      2⤵
      • Executes dropped EXE
      PID:3088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 256
        3⤵
        • Program crash
        PID:4012
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3088 -ip 3088
    1⤵
      PID:3764

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\az.exe

            Filesize

            603KB

            MD5

            80dd7b689764b6a7a00f51bad03f958d

            SHA1

            eba6f08296c0966997053c08f65ecbc8ac03c0a8

            SHA256

            30779c1c094a74d0ff2053c06ec3e7d599337d62e80ddc4c811e7c30ba0c0624

            SHA512

            ecd8f29618ddb324d553081fe8f8d71c44d95120cef613ec52f44f37dd6dbe45192830eb7e2a69cfd6997d2ca1036c624c516b2b91583766feb30f8667acd4d1

          • memory/3088-11-0x00000000005B0000-0x000000000060B000-memory.dmp

            Filesize

            364KB