Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 13:00

General

  • Target

    371431e956275128c99376f06dd734c0.exe

  • Size

    171KB

  • MD5

    371431e956275128c99376f06dd734c0

  • SHA1

    9e39aa6c8d9eef1c31c54f22b9bc8380492c1512

  • SHA256

    f20032be595f8364f65a52bcaafd16104884232ff214c67ba7938d6f9d6e958e

  • SHA512

    ec68ead18e067ee8a143d48cc96bf56232a7058e156807d8c315a9e8b47443b3b1ea95e31aee521ad62ab5a8b4628b0527f1767db676a272b9860b9d7c428f73

  • SSDEEP

    192:rQVNQuKBcdmkQRkOVnnIHBtkYF8lFLKJT2aqpfXZRoZinL1LBspkA+CHUwtAnoRm:Es1BcdmkBinnIhtkNz+JALSuoRO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\371431e956275128c99376f06dd734c0.exe
    "C:\Users\Admin\AppData\Local\Temp\371431e956275128c99376f06dd734c0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\directive.bat" "
      2⤵
        PID:2680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\directive.bat

      Filesize

      87B

      MD5

      d98563023da3f91eef7f2028ad9aaf5f

      SHA1

      12abff523dd7c1dc53465fe548b132ecec0b81f7

      SHA256

      ef6ee5da3963cadc651fd8f5b447999db3b8f7ac79a7150f3985c648f2633ed6

      SHA512

      1dcd3cf75daa9c443f761b0d75495d6e9f535b4dff37184cd9f06bf40954098e0bd65d5a80f8b7ea7905bd407701059fd4a270b32dc6b09b909e3b934c4d2152

    • memory/764-0-0x0000000000B30000-0x0000000000B60000-memory.dmp

      Filesize

      192KB

    • memory/764-2-0x000000001B770000-0x000000001B780000-memory.dmp

      Filesize

      64KB

    • memory/764-1-0x00007FFDD3990000-0x00007FFDD4451000-memory.dmp

      Filesize

      10.8MB

    • memory/764-7-0x000000001B890000-0x000000001BA39000-memory.dmp

      Filesize

      1.7MB

    • memory/764-11-0x00007FFDD3990000-0x00007FFDD4451000-memory.dmp

      Filesize

      10.8MB