Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 08:55

General

  • Target

    618fa1db7acc7f02d511756a2fdb6307.exe

  • Size

    367KB

  • MD5

    618fa1db7acc7f02d511756a2fdb6307

  • SHA1

    f14c94c1135d59846597669e6e9dfc1423a53fe7

  • SHA256

    21f81570630af5e52ce9804d80cf060a5f0553856f9154f325e9fdcbc2ef10f8

  • SHA512

    d35912817b248fd468c22be1565e6d69da241b3746e94c2154311f821f939af50dbd1adc5aef44ef709480bf12a19ec5679298f7bfe2d873fa48bf1551aa899f

  • SSDEEP

    6144:iO/N4yidWNLbii5bkgVuN+xSKV7Wkrsf7LsQH8frtCj6SLoI:iOVedQXikbkgaISKVy8A6SLoI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\618fa1db7acc7f02d511756a2fdb6307.exe
    "C:\Users\Admin\AppData\Local\Temp\618fa1db7acc7f02d511756a2fdb6307.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\b991cc78-47ba-40fc-a139-37062ab6db2a\62F0DE83-45A3-44DB-9697-4A140AC85636.exe
      "C:\b991cc78-47ba-40fc-a139-37062ab6db2a\62F0DE83-45A3-44DB-9697-4A140AC85636.exe" -y -p8FEF45FA-F2B3-40D5-B6AB-8B0A80D76521
      2⤵
      • Executes dropped EXE
      PID:5020
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" c:\b991cc78-47ba-40fc-a139-37062ab6db2a\start.hta
      2⤵
        PID:2816

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\b991cc78-47ba-40fc-a139-37062ab6db2a\62F0DE83-45A3-44DB-9697-4A140AC85636.exe

            Filesize

            208KB

            MD5

            fa99d30e757956d6d8bf6db9005ee081

            SHA1

            41b5a5f11ff3d7691ca261971e7336faf1d1a1f9

            SHA256

            b6a51af80991b7a1acdaa6cfd7f3bb55057b6884e68e0374c62826de64dd5c83

            SHA512

            e215c16828eb35e62cc4956cf8b6631c10bfcd435b7eff33366a969a32f029d787b394e62c970d14f10184a7754fc33f22e0641fcebf3ac05449836620939a9a

          • \??\c:\b991cc78-47ba-40fc-a139-37062ab6db2a\InstallerHelper.dll

            Filesize

            132KB

            MD5

            c6bb5c8c284dca85783c63b72bcfd320

            SHA1

            bddb5f3b7cae522d3a35a677b2181c3a2d5c3689

            SHA256

            690e586d7c0ed8c49b44dd42580a9451a02b3b25db22b200b81a803ef847d666

            SHA512

            c79c1cabdb5bc0f1070dfcde2b4182e9092be1719e140f1cf510bd19ffb2f08945f60ca4dfdeb2f83b443ffa4a3431304ea56f288bb11c233bcf72dd3ccf8f60

          • \??\c:\b991cc78-47ba-40fc-a139-37062ab6db2a\loader.gif

            Filesize

            1KB

            MD5

            e88ebd85dd56110ac6ea93fe0922988e

            SHA1

            684a31d864d33ff736234c41ac4e8d2c7f90d5ae

            SHA256

            379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb

            SHA512

            211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7

          • \??\c:\b991cc78-47ba-40fc-a139-37062ab6db2a\start.hta

            Filesize

            1KB

            MD5

            db4ada697fa7a0e215281533d52578e9

            SHA1

            fb755ea8371edf5065dc53e21eb413603f9eba7f

            SHA256

            f949fd6ca734830572128b4348dfd039419140c7ef501d80773f71ca3f0ed78c

            SHA512

            9ba1d2658785dd3c88b4399132f8330dc58872235e19ca9854b0e453d8cc7a58de0c8be84da376a72b5851073f531c95b2c6afa84f43053561ca8e6751d6e2f3