Analysis

  • max time kernel
    124s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 17:35

General

  • Target

    3150ab680dedc6b56b58c91f504bb56d.exe

  • Size

    94KB

  • MD5

    3150ab680dedc6b56b58c91f504bb56d

  • SHA1

    36e1c6c8d9c704941b1186838a262a5065a84f23

  • SHA256

    5cd6efa3ec579bddfb6f3895db7f07ac70e483c69a60ad623bbb57d9192b819f

  • SHA512

    27b62cf68e6e5fdddc06cabca39b10ac4de55a8c1dc3de0ffd12d78b217373cdd6bf6e720c0577843242afdfdf9e30704cdbed2a5636b006e85a01e7701c367c

  • SSDEEP

    1536:vfg+M2Y9oH+cpTKeyaI0Z/od8bDbRvU5yYeVYXrgITAGXBB3exYEjpepikFIy:vfgyY9oH+cTKGI0Z/oooeVYXrgI0GXW4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3150ab680dedc6b56b58c91f504bb56d.exe
    "C:\Users\Admin\AppData\Local\Temp\3150ab680dedc6b56b58c91f504bb56d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4368
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Exf..bat" > nul 2> nul
      2⤵
        PID:2440

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Exf..bat

            Filesize

            210B

            MD5

            227c0844ebb8e706df210232a4ff3e73

            SHA1

            e589d703d42c680474adf82b34b3be05b694f495

            SHA256

            cb64efb01d901dbd9e84a4dbc20bdc4739aa656537fca3f5c67d711ea879d659

            SHA512

            7ef7eec635c3bd7fc8b5e39e6b96ab2451ef8368403c6c97b89d3d757fdc166c584e8b604c04cf6939b99be9ca31af842515c3987c7792c8b58f232107ae5a1a

          • memory/4368-0-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/4368-1-0x0000000000430000-0x0000000000431000-memory.dmp

            Filesize

            4KB

          • memory/4368-2-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/4368-3-0x0000000002750000-0x000000000276B000-memory.dmp

            Filesize

            108KB

          • memory/4368-4-0x0000000002750000-0x000000000276B000-memory.dmp

            Filesize

            108KB

          • memory/4368-6-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB