Analysis

  • max time kernel
    148s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 11:32

General

  • Target

    173803bc478781463e481e45c025b512.exe

  • Size

    21KB

  • MD5

    173803bc478781463e481e45c025b512

  • SHA1

    00cd0b6a032f9306039a6ec145476bfd499c2279

  • SHA256

    e999a9cf2f908e90a6c0669b23c287b969ecac10ba4ebd0a9f4fd804f4237116

  • SHA512

    31348a37d8eee97b0f3abdf2d4a8015bf4a2206f4abbfa8707673f65d28b4c8cef19c4d0ca83f26d08180168f83bbca20deaa325e83a075d53bda82c4dc2a239

  • SSDEEP

    384:HIiV728hUQ7Y2P/cVEccDdye7kjlWLe7grPiA8jyrMPhTjanbBoZn8QTHLVaNJas:HRGuY2P0Vo6r7SiAwyrMRjbV/HsnbcuE

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\173803bc478781463e481e45c025b512.exe
    "C:\Users\Admin\AppData\Local\Temp\173803bc478781463e481e45c025b512.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4055.tmp\setup.bat" "
      2⤵
        PID:4652

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\4055.tmp\setup.bat

            Filesize

            578B

            MD5

            d2a572e1ec318b9147c3f6ba7fd17575

            SHA1

            d63a4d25d6d5c9b1023bf17da642d845e4c13c54

            SHA256

            6e6852df07266e0042dc337fe70dd2b799567cfcdb30313257fc6670dd8592df

            SHA512

            5242bbd72909ae358396ee9e8ef12a1ca59720873f20d40af6fb52ba47c575b35cac98f851a85b35409e3915f284cced5d9a0f2a58374de50cf0293d7954918d

          • memory/4392-0-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4392-5-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB