Analysis

  • max time kernel
    196s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 06:30

General

  • Target

    111d0ac8852c76f41ce3f5da4f654503.exe

  • Size

    103KB

  • MD5

    111d0ac8852c76f41ce3f5da4f654503

  • SHA1

    f7d4264e48d95d8427b552df2ba334498c699bc9

  • SHA256

    42d7ae0c35e6da95bfc25bcd438de93771fd95a3a0218506882b794024852895

  • SHA512

    529b6d7516a91a4c6e4a936b569861bae4b9359d4f79bd2d8398cde13376e100e7996b5c60824530fd782d97c0e476c817b0e872c84c1ad8fd813f6936928ea0

  • SSDEEP

    1536:CqJW3IBqpAXmqmuyBXSu6omC/w539lGzNP5x2d5shU73Y:dJW38/4EdVGNxxjhULY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\111d0ac8852c76f41ce3f5da4f654503.exe
    "C:\Users\Admin\AppData\Local\Temp\111d0ac8852c76f41ce3f5da4f654503.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Wmb..bat" > nul 2> nul
      2⤵
        PID:2348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Wmb..bat

      Filesize

      210B

      MD5

      b52b9c8e1c4ec53f2be3bcd97678e9ad

      SHA1

      4d5dacf066710d998ea951319550c1d07e933686

      SHA256

      e63f8a2a2aa3449261925ab3d00c49ac81a05d787359835b8115abd35ec3d30a

      SHA512

      22aa6814fbe66f5700933760bc224902d5408989cdcff6caac25f570e01bd8a59646b4965f6dae44e889401c8ecc4429c5d887e4712e25ba8ffdea93a495fd4f

    • memory/3216-0-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3216-1-0x00000000009B0000-0x00000000009B9000-memory.dmp

      Filesize

      36KB

    • memory/3216-2-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3216-3-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3216-5-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB