Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 02:44

General

  • Target

    57c657d65e6f838951a7765587d0b0e6.exe

  • Size

    1.6MB

  • MD5

    57c657d65e6f838951a7765587d0b0e6

  • SHA1

    b5f4f3081036f1769a80b7dd885b6bffd1a8911a

  • SHA256

    d6dda35121b08926af752fa94a6c7ed813ad6173d770dab74512c7e1bd519adc

  • SHA512

    c8c96844076adebd798c6df13b4791ebfd81871505ae2a919dfe8a300d55f58b44877173bdfe951b510d46ba0269ec877cc3b6b6bd5325b9ad92e1685879bb63

  • SSDEEP

    49152:fZgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9Q:fGIjR1Oh0Tk

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57c657d65e6f838951a7765587d0b0e6.exe
    "C:\Users\Admin\AppData\Local\Temp\57c657d65e6f838951a7765587d0b0e6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4978.bat" "C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\""
      2⤵
        PID:2824

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\4978.bat

            Filesize

            212B

            MD5

            668767f1e0c7ff2b3960447e259e9f00

            SHA1

            32d8abf834cce72f5e845175a0af2513b00504d8

            SHA256

            cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

            SHA512

            c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

          • C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\D1BDD40752184763AF933AC3345FC5AB_LogFile.txt

            Filesize

            2KB

            MD5

            e74f69d9a40bfa16197655794a541b27

            SHA1

            1aca6bd4b2cd253b70ec02bb3b3735a32b64bf9a

            SHA256

            2ba1e3e2d0155c1280c89cfb26c6ea9ab4e08c0dc5caabc8e4d497d41c20dedf

            SHA512

            73d99fea865fccd15893e5a202cb2dd6c81d7134746337ce85091a5004950263d315ad9bf0092a6e151e985cdb398c8d66fe25131dec418e139dad822510590f

          • C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\D1BDD40752184763AF933AC3345FC5AB_LogFile.txt

            Filesize

            1KB

            MD5

            89ee8346c2fe115324c70f57696798b0

            SHA1

            719069dd048502dc3284f992644cf0616ff49805

            SHA256

            bdb4135d9513db749250c6edbe513f8e4f2623052b6c7bf8ef1f36b2a65497a9

            SHA512

            29d8c44b23bc386d24200e2db8266be459d86b2db64bf3efc532e813b82a849f8fbd70b3ba261042bd282f43d09ebb34aab9f233cbfc88ba7bb8c0be95656399

          • C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\D1BDD40752184763AF933AC3345FC5AB_LogFile.txt

            Filesize

            9KB

            MD5

            3eeaa53f40fedbd1d67557491cab4720

            SHA1

            9fcdccb1590d5b510d1cf95ab2a8498a0bfccd09

            SHA256

            dbfa83d1d61cc71b12e9bfe8b273e8461d54eac33ba69968b538244086a3a541

            SHA512

            19df0647dd12d1886c107d870b60e9e25e9489c33193ce8a82548a13556338942ee4c23d9dd77d82fcc09d654feabd96d180fefb3be5e71591414796864bbf5f

          • C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\D1BDD4~1.TXT

            Filesize

            105KB

            MD5

            1a88f45c2a89dc7436916bf769b4fd30

            SHA1

            c0c8b9adb23ba27857980a5684bdaacf90fdd0eb

            SHA256

            e8573d40b42ab3c106c36fbc9c513805a0c9b371eb760efebf72743bca678110

            SHA512

            ae26cd7b594b0ef2a7a29ee9063d562ecd5f8269570e402600bd2cb23eb10b018c1309aceeea51edd9db24662b548896044b0d9607e25265d19875dba7925bf4

          • memory/4684-61-0x00000000033D0000-0x00000000033D1000-memory.dmp

            Filesize

            4KB