Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 07:05

General

  • Target

    11b3c5db2d31d8f654fa125f7798dd4f.exe

  • Size

    110KB

  • MD5

    11b3c5db2d31d8f654fa125f7798dd4f

  • SHA1

    6686543b927e0ee2c0948a9587c4fe68f1d6b4c1

  • SHA256

    6d0d70d298ea290e65fac13444fbdba5caaf6e43d79381f083a366ccbac18357

  • SHA512

    b6afda5e984403271c7ec2866d71e51f4bd178259330f7ba4c6a5b9e66474aa61865283a73022aa97fae177b1a79d0381f0abfe237876cbf19a79b5cd390135e

  • SSDEEP

    1536:h0LFGxfLR3JaTNjDTJIBTtL9qfEovoWODtaqPhNm1ekqan2rMI:hMGh1Ja1q3L9qfHIDbJNvV

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11b3c5db2d31d8f654fa125f7798dd4f.exe
    "C:\Users\Admin\AppData\Local\Temp\11b3c5db2d31d8f654fa125f7798dd4f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ihv..bat" > nul 2> nul
      2⤵
        PID:3704

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4064-2-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/4064-1-0x0000000000E90000-0x0000000000EA7000-memory.dmp

            Filesize

            92KB

          • memory/4064-0-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/4064-5-0x0000000077590000-0x00000000777BB000-memory.dmp

            Filesize

            2.2MB

          • memory/4064-7-0x0000000074B40000-0x0000000074BB4000-memory.dmp

            Filesize

            464KB

          • memory/4064-8-0x0000000075FA0000-0x0000000076062000-memory.dmp

            Filesize

            776KB

          • memory/4064-13-0x00000000777C0000-0x0000000077968000-memory.dmp

            Filesize

            1.7MB

          • memory/4064-21-0x0000000076D10000-0x0000000076D35000-memory.dmp

            Filesize

            148KB

          • memory/4064-27-0x0000000076D60000-0x0000000076D6F000-memory.dmp

            Filesize

            60KB

          • memory/4064-26-0x000000007FD10000-0x000000007FD29000-memory.dmp

            Filesize

            100KB

          • memory/4064-25-0x0000000076D40000-0x0000000076D51000-memory.dmp

            Filesize

            68KB

          • memory/4064-24-0x000000007FCD0000-0x000000007FD0D000-memory.dmp

            Filesize

            244KB

          • memory/4064-23-0x0000000076880000-0x000000007689C000-memory.dmp

            Filesize

            112KB

          • memory/4064-22-0x000000007FC80000-0x000000007FCC9000-memory.dmp

            Filesize

            292KB

          • memory/4064-20-0x0000000076410000-0x000000007642F000-memory.dmp

            Filesize

            124KB

          • memory/4064-19-0x0000000077970000-0x00000000779E1000-memory.dmp

            Filesize

            452KB

          • memory/4064-18-0x000000007FBA0000-0x000000007FC7B000-memory.dmp

            Filesize

            876KB

          • memory/4064-17-0x0000000076CE0000-0x0000000076D01000-memory.dmp

            Filesize

            132KB

          • memory/4064-16-0x00000000774B0000-0x0000000077543000-memory.dmp

            Filesize

            588KB

          • memory/4064-15-0x0000000004140000-0x000000000414B000-memory.dmp

            Filesize

            44KB

          • memory/4064-14-0x0000000076380000-0x000000007639D000-memory.dmp

            Filesize

            116KB

          • memory/4064-11-0x0000000076360000-0x000000007637B000-memory.dmp

            Filesize

            108KB

          • memory/4064-10-0x0000000076090000-0x00000000760A8000-memory.dmp

            Filesize

            96KB

          • memory/4064-9-0x0000000076250000-0x00000000762CE000-memory.dmp

            Filesize

            504KB

          • memory/4064-6-0x0000000004110000-0x0000000004118000-memory.dmp

            Filesize

            32KB

          • memory/4064-4-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB