Analysis

  • max time kernel
    90s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 18:26

General

  • Target

    17b27804.exe

  • Size

    868KB

  • MD5

    0981f1145c1cec6a5de51c7d585affe3

  • SHA1

    9adfc833aa773a81d2d5b101027417c57f6d343f

  • SHA256

    17b278045a8814170e06d7532e17b831bede8d968ee1a562ca2e9e9b9634c286

  • SHA512

    52c59c8e6c6eabcd712dc4e66093f62e6c486d3784e445cb5144c50bd6b376f09a8169e2dc36da31b03163edd1a33dce00305b16e6b31ff0914d7cbf10617e68

  • SSDEEP

    12288:yPgtJQXBDj5yo6kkWRS05K6Jrz+EW3QL+1xXnKfVM6fkjuJ03Fl7bE:MYJQXBD1ekkbSK+HsoAxXnsr21l7bE

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17b27804.exe
    "C:\Users\Admin\AppData\Local\Temp\17b27804.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Windows\SysWOW64\wscript.exe
      wscript "C:\Users\Admin\djyvzrzokpcrajgbhf.ne" //e:VBScript //b
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\System32\ipconfig.exe" /flushdns
        3⤵
        • Gathers network information
        PID:4736
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\System32\wscript.exe" C:\Users\Admin\abide.lnk //e:VBScript //b
        3⤵
          PID:2276

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\abide.lnk

            Filesize

            8KB

            MD5

            6324ab6adec785aecd59de7f2a3569ff

            SHA1

            f2128ac9c68f314dd57239c619a1998a4f636d0b

            SHA256

            0ff6dcb990a21623e985a4ecb3563809873392d6aca31f8b012df5bbe9bdb709

            SHA512

            71d192afcef81405308845bddfcb450e92deff56ad887dd668bac64c2a1fd48f3e1ba412d5c42a34df510aa79b9372923fea1bf865bd7ac3482800c3a96a22fe

          • C:\Users\Admin\djyvzrzokpcrajgbhf.ne

            Filesize

            3KB

            MD5

            3f9e439981eba1b6d79e4ca460e43565

            SHA1

            45171b1b78705570dda46f6adf6778732af8ed34

            SHA256

            c44e8002284f31bca2b9f6cddeeecf8d982826205b5af355c9b011a99c5a7eec

            SHA512

            7287932eab0a1a152f9437728996a322de2bbdba43c061fe15278dda8a419f0f46bbb1f41aa0e90b2fd1f200802fe3ba51d39fa787a683e280315166b7317a0e