Analysis

  • max time kernel
    148s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 17:17

General

  • Target

    f9d8debc1102649a417608d746a73980.exe

  • Size

    352KB

  • MD5

    f9d8debc1102649a417608d746a73980

  • SHA1

    f27799f39a5cdc3db066f2d4bf734f25ed90ee81

  • SHA256

    23118771c121bbf86b7099e0293d00d78d4b58d1da5e9b249f0e11d58791c70d

  • SHA512

    1e2c20c5f6e3003b004d4cdbd428cb31933fe703ad8c195d1383a8beb76024dc835ced3ebad5a6b30b610b055456389a8b2bd0f5420fa0f458ec439386feebb0

  • SSDEEP

    6144:u5FrtlrIiswtAyxmbeoYRMHpeW+5GZsNhHCUjg:uHrtqi3trxg4uHJXZsNhHCyg

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9d8debc1102649a417608d746a73980.exe
    "C:\Users\Admin\AppData\Local\Temp\f9d8debc1102649a417608d746a73980.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\Sysceammkauj.exe
      "C:\Users\Admin\AppData\Local\Temp\Sysceammkauj.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Sysceammkauj.exe

    Filesize

    352KB

    MD5

    bc46b448ccbb61ca97d8ea1963c6f108

    SHA1

    6403990eb757d28ca101adc29e9f486412a8a0e4

    SHA256

    ae1c034169fd7f3db8407f723ed2c04bd38cecf5d72383cd1bc28f73068680f3

    SHA512

    d4d4867a4374dc4096972114c58825b6d285b9bf48a48fa0afca1394cfaf58348780c66423ae5edef6def3efd4dcbf6c57ac7e74c46de5ece390eb84adf70334

  • C:\Users\Admin\AppData\Local\Temp\cpath.ini

    Filesize

    70B

    MD5

    b9e0b86dfe9ad42cfcbaf2f2be852e5c

    SHA1

    1fe98dfb25e4dd8b6c266e905d805fab2bf85dce

    SHA256

    05f72f7f46986a0eea29773940f89be2e6250ed60eb466cf1732f0fbf897ed9f

    SHA512

    cba9af02517074312aba681f8a1edab5f44a8b3f2ea06be1b3f3ce58a1813fcc486bbb5a252ea0670e163921c4dc669cb697cdc70048f535857a28576dfd7bfa

  • memory/216-0-0x0000000000400000-0x000000000045A34C-memory.dmp

    Filesize

    360KB

  • memory/216-38-0x0000000000400000-0x000000000045A34C-memory.dmp

    Filesize

    360KB

  • memory/2464-39-0x0000000000400000-0x000000000045A34C-memory.dmp

    Filesize

    360KB