Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 09:53

General

  • Target

    675202e5184bad92d03ec844a98267fc.exe

  • Size

    75KB

  • MD5

    675202e5184bad92d03ec844a98267fc

  • SHA1

    037f7a5b4fae35521f5130470570c2ae51b7bf0c

  • SHA256

    2cfb22687096e9857568431ef29bbc14d889e9ed0aea662e2e28fa984d9e0cfa

  • SHA512

    ce149fbcf7b1d42aa489b87dda858e52cb4a38be8338aa6f1b98ec9cd03c349213204622112e0f4c4532191a00c570ec29fda88f2fbaf142e47d40deb6a93031

  • SSDEEP

    1536:2M669FOOSQ5hgbibVE1qTwswXsLzFali:L7jhgmbVE1qfc+ss

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\675202e5184bad92d03ec844a98267fc.exe
    "C:\Users\Admin\AppData\Local\Temp\675202e5184bad92d03ec844a98267fc.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Kmp..bat" > nul 2> nul
      2⤵
        PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Kmp..bat

      Filesize

      210B

      MD5

      495a7c8e07c7c00e82acdd4fa9a18664

      SHA1

      143510201204eb172e9d3a72a8f9c2d40d04cefb

      SHA256

      93179b8d8f3895303165ca4d2e9b5482cb42743c4d10743321edf6d4754d72c7

      SHA512

      6600c825bdce57e0badde03376f2ab863a2f34aaf143b5adf9a561e89c57564833944ba9698dc7a196cdc218d44303338e94e26392db8fc565cafbb91b813d9b

    • memory/1416-0-0x00000000021A0000-0x00000000021C5000-memory.dmp

      Filesize

      148KB

    • memory/1416-1-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1416-2-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1416-4-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB