Analysis

  • max time kernel
    156s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:37

General

  • Target

    18bf9f1007847fcf1eb3a0e562c41a8f.exe

  • Size

    49KB

  • MD5

    18bf9f1007847fcf1eb3a0e562c41a8f

  • SHA1

    aa8e749d42d112a6e31e374895ecda55bd421cda

  • SHA256

    1385e7c83bf4c725e736ea517b327897d31591d7b03600aa76eba99707ab4c94

  • SHA512

    0a7d4740bd77608bed7d02b0955485f1c10e979250250d6a04865e885eb11fe4be6ab24247fbdc215cd00f401c1adaa531f567f7a72eac3a3e742f135a9d0e5c

  • SSDEEP

    768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxgrs6:24Bobv7aB0EooYEC3rUVcYgw6

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18bf9f1007847fcf1eb3a0e562c41a8f.exe
    "C:\Users\Admin\AppData\Local\Temp\18bf9f1007847fcf1eb3a0e562c41a8f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe
      "C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"
      2⤵
      • Executes dropped EXE
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe

    Filesize

    49KB

    MD5

    f1d278b19205d1210a3b8e745aed71ef

    SHA1

    52453540aa09fd01647c5fb86de50f7eed82d446

    SHA256

    d46354e8d8224665bf245402cbb0bafaacbbdf6a1af90b5b8486da83b8f37c51

    SHA512

    730a3a7f48b4b48a246779ebfecaab45857da972287d639ab4f10bcebc223d5178dbe129b9b10cd2ca245ccf532078dcb773483359f589eb69f17f7e572d5fc6

  • memory/1632-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1632-1-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1632-2-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1632-4-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2728-18-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB