Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 15:05

General

  • Target

    77bd9a9ddfb5b84aa97ba08f75360756.exe

  • Size

    561KB

  • MD5

    77bd9a9ddfb5b84aa97ba08f75360756

  • SHA1

    03980cc97d3b1ed2b1379aebfb75a2c9a68c670a

  • SHA256

    64f6bed3f06ba8ef09531205314922a32ef9503d9846554e537d0df899a9b41e

  • SHA512

    4a0c0a8a28a0fca539327f897ec16c109c3dc1919900c0cfa756a0c8e3fed1ca5f856f58a2e0ef204d50f69ed8b42654526e12e8a389d6ea15b0955dfa636b49

  • SSDEEP

    12288:pM/DX9GrF9V12HLJvoHLJvKIHLJvoHLJva1e9Vnk9:pMLX8r/V1ILJeLJSmLJeLJi1AVnk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77bd9a9ddfb5b84aa97ba08f75360756.exe
    "C:\Users\Admin\AppData\Local\Temp\77bd9a9ddfb5b84aa97ba08f75360756.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\SVZ.AmyXan 1.1.exe
      "C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\SVZ.AmyXan 1.1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\SVZ.AmyXan 1.1.exe

    Filesize

    444KB

    MD5

    446e384496f4dcf0e46aeb63fac4b3f1

    SHA1

    dcfa0bc8bdd08718aba4a391fac4f88120941668

    SHA256

    c5139af86dac359af65af29bc926fdd29b7f55ffc6e31ac944ebdbfbac0494b0

    SHA512

    5abcc99cc6af80777cd8b6b6c6b2d2cf7cfe686b6e7c18788bdb8ddf493246de5568119158ac38c7d146569033effd77642b3a3d7078adaeddb52f501cb319be

  • C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\Zombie.gif

    Filesize

    17KB

    MD5

    dcd8fdba223e715f0932d12c411e9d50

    SHA1

    e995f7c434485340ea4f1156202caa9022c40a8d

    SHA256

    990043425b58e8b3873399b750a3aa6ab4144bbe69e232e7434aa78cecf8d6ea

    SHA512

    6e6b26a80a91b6a02c8d464043646e994d2532017b5557c81c203c3e736c416115ff2b27d25542eb219ed0f8f6e724bd3d47174063b43a65000e7a57f0239da1

  • memory/4160-19-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB