Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 21:30

General

  • Target

    41f4d90d426e2f21c80b57bcd99e384c.exe

  • Size

    138KB

  • MD5

    41f4d90d426e2f21c80b57bcd99e384c

  • SHA1

    8387d670b82c2212cef1450388673d80ea7b1386

  • SHA256

    5af3ef5c6562097f2cc6a7050f6e263652d97d08fe29b8fe8fa200421b68ee65

  • SHA512

    4fd2fce182fc5a3a70ade6d606f89759bfbce03dded7ead5392ae0c225bbc5b97cc169134d6f54f48aa56127b217e8f4266a747025c758c959cab3c01ce0a087

  • SSDEEP

    1536:hB1dlgRwgoY9ef3p81UFz2PEnm5YoNoz4BUoNBealHf0lCYCEk:b1dlKwgj23+Oz05YoNozW3NBP/hYCl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3628
      • C:\Users\Admin\AppData\Local\Temp\41f4d90d426e2f21c80b57bcd99e384c.exe
        "C:\Users\Admin\AppData\Local\Temp\41f4d90d426e2f21c80b57bcd99e384c.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4912
        • C:\Extracted\server.exe
          "C:\Extracted\server.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3820

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Extracted\server.exe

            Filesize

            31KB

            MD5

            8b5f0f935f2fff261fc4ab56f0b1287e

            SHA1

            2a833245300134736e1af7e43cb47384e214a31b

            SHA256

            aec9a33dc94fc6758a16b532e02c87e8c53593cf185427cef55b21bf5df6d8c7

            SHA512

            eb06049e561d5565b1432df120d3e04ccbd54587bb3a4a98670007a2f410f3e001dc3e35ab08d63242f9ed65591d871973938453aee7cba4ddc5632b99872a5f

          • C:\Users\Admin\AppData\Local\Temp\sfx.ini

            Filesize

            212B

            MD5

            4043f21372dabcb54fb577190280e7d1

            SHA1

            1cf9ac7c9cbf8e0472cb3e147043271a558b9dbf

            SHA256

            ff4da7dc53376c7fade6e4762af32589cd2df23876b4739575f154893c36b58e

            SHA512

            62a5394fb435f91c890d31130e63cb86b11e641f1f58c987d55e23da03cc857d02f4ea51770206cfd5bbfdce25a18658b7dbe1423487ef20bf7a7b9d5e91a04e

          • memory/3628-27-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/3628-28-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

            Filesize

            4KB

          • memory/3820-25-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3820-26-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/3820-32-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/3820-31-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB