Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2024 14:21

General

  • Target

    727750484416bf033b50d84ea682716d.exe

  • Size

    47KB

  • MD5

    727750484416bf033b50d84ea682716d

  • SHA1

    447cd063d225078fc09f2eaa0ed701f68c15efbf

  • SHA256

    180009a6f0786e381751d83c292bf4c3119d14eda0bbf7cec67137e4028d5c59

  • SHA512

    258a18d4c0ec9bf7d2ec2c77d62e6c8cd4f9adf11760d4ca2ac7d83dfecbea8b02a46dc6e2631e6d164f15b78f36d82d3483b5607ffa8fd267a2d15618516098

  • SSDEEP

    768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxx:24Bobv7aB0EooYEC3rUVcYx

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\727750484416bf033b50d84ea682716d.exe
    "C:\Users\Admin\AppData\Local\Temp\727750484416bf033b50d84ea682716d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe
      "C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"
      2⤵
      • Executes dropped EXE
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe

    Filesize

    47KB

    MD5

    2a3b61aec77c7208900d58b2969cd406

    SHA1

    8d8c9126d5d1146e9596d1c2ca37a6b7cf8e0523

    SHA256

    e3fc0483a17e84cee1183cb561319ba41b7272836e1791efaec10bc8b1e831b9

    SHA512

    38d6059d0ea667ecbeca04726300a06acaf670071258396728618cdced38424861043fc8ad0328eaa870c8dabd26c9e657895b3b68f8b8c2daf5d815e4c18730

  • memory/2212-14-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4280-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4280-1-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB