Analysis

  • max time kernel
    163s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 02:44

General

  • Target

    4d8fe77a34bd13fd59b183bdb877c444.exe

  • Size

    42KB

  • MD5

    4d8fe77a34bd13fd59b183bdb877c444

  • SHA1

    897e0fd8ee533a53cb6fa847fcdb5b5c1b55baad

  • SHA256

    967222f8c657b546e83bac7cc75e4f701529ef7ea757c5fd087c62ea3c7788f9

  • SHA512

    6106b1d8218bcbc472f521facc58f493e5e9d3b6f3de20960419e18b1e123c597465a0aaa5ef7d95bf2d49615b75d21706e739dd6c2600a82005037e31394ec3

  • SSDEEP

    768:022lUaV2R6mqLDwprB+fV4YGIscBYzZy52J/Q6x6U:b6Uakvp0wcBh5kpx6U

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d8fe77a34bd13fd59b183bdb877c444.exe
    "C:\Users\Admin\AppData\Local\Temp\4d8fe77a34bd13fd59b183bdb877c444.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4D8FE7~1.EXE >> NUL
      2⤵
        PID:4820

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2196-0-0x0000000000560000-0x0000000000564000-memory.dmp

            Filesize

            16KB

          • memory/2196-1-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/2196-4-0x0000000000560000-0x0000000000564000-memory.dmp

            Filesize

            16KB