Analysis

  • max time kernel
    140s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 12:58

General

  • Target

    43bdbbf12d876c39f8866a6a8f8400e1.exe

  • Size

    1.2MB

  • MD5

    43bdbbf12d876c39f8866a6a8f8400e1

  • SHA1

    8073e93095aa648866c32d53b3572b52497c0bcd

  • SHA256

    e954cc80416a0beecfa125197fd28446ba6f1f01d748eafb0cf334762dbc8dee

  • SHA512

    cfd3552d54e8d6ce9f4fc8702bae6eebfb2797d8bcec18db0f81d2833458a4c0134d00a6c4b7506b179b0f3ae5ad16e92ad611020160eff81906bb9f8e87cd95

  • SSDEEP

    24576:piHsZP3U9f4uoIFst0GWKNXJLMTpZuTuRi10jbXGskwFShESPMM6fH:zPkJoPt0GXJLepauRG03bFS5PMM6v

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\43bdbbf12d876c39f8866a6a8f8400e1.exe
    "C:\Users\Admin\AppData\Local\Temp\43bdbbf12d876c39f8866a6a8f8400e1.exe"
    1⤵
    • Checks computer location settings
    PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1748-1-0x00000000001D0000-0x00000000001D2000-memory.dmp

    Filesize

    8KB

  • memory/1748-0-0x0000000000400000-0x0000000000960000-memory.dmp

    Filesize

    5.4MB

  • memory/1748-2-0x0000000000400000-0x0000000000960000-memory.dmp

    Filesize

    5.4MB