Analysis

  • max time kernel
    172s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 16:52

General

  • Target

    7d806a8dc2cba7a19367f2df6469c637.exe

  • Size

    2.1MB

  • MD5

    7d806a8dc2cba7a19367f2df6469c637

  • SHA1

    e20e0bc603b5bb35a858e4d146e2a1a163971530

  • SHA256

    c3814d14e580005378655d2ab8a2e889a0bf517b80b13e394b88d8f7e7b0d29b

  • SHA512

    e8d4b5b483793ad2f655ec5e2d40388c0308d86e01995042bb5c94ad58b93a974ec041011093404faa09bc5f0982bea608f62dcd03e2e6d78cb1a5b3d7f6bf88

  • SSDEEP

    49152:2uzbL+u+4fWHLY0j1IK9Fj7w1cGxRshM5q:2uvL+B8WHLXjCK9Fnccwsh9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d806a8dc2cba7a19367f2df6469c637.exe
    "C:\Users\Admin\AppData\Local\Temp\7d806a8dc2cba7a19367f2df6469c637.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
      2⤵
        PID:4944
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
        2⤵
          PID:4828
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
          2⤵
            PID:3916
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
            2⤵
              PID:5008
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
              2⤵
                PID:3352

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2632-0-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/2632-1-0x0000000000490000-0x00000000006B4000-memory.dmp
              Filesize

              2.1MB

            • memory/2632-2-0x0000000005780000-0x0000000005D24000-memory.dmp
              Filesize

              5.6MB

            • memory/2632-3-0x00000000050D0000-0x0000000005162000-memory.dmp
              Filesize

              584KB

            • memory/2632-4-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/2632-5-0x0000000005370000-0x0000000005380000-memory.dmp
              Filesize

              64KB

            • memory/2632-6-0x0000000001070000-0x000000000107A000-memory.dmp
              Filesize

              40KB

            • memory/2632-7-0x0000000005370000-0x0000000005380000-memory.dmp
              Filesize

              64KB

            • memory/3916-16-0x0000000002A70000-0x0000000002A80000-memory.dmp
              Filesize

              64KB

            • memory/3916-15-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/3916-20-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/3916-19-0x00000000054B0000-0x0000000005AD8000-memory.dmp
              Filesize

              6.2MB

            • memory/4828-11-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/4828-12-0x0000000005180000-0x0000000005190000-memory.dmp
              Filesize

              64KB

            • memory/4828-13-0x0000000005050000-0x0000000005086000-memory.dmp
              Filesize

              216KB

            • memory/4828-14-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/4944-8-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/4944-9-0x0000000000F50000-0x0000000000F60000-memory.dmp
              Filesize

              64KB

            • memory/4944-10-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/5008-17-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB

            • memory/5008-18-0x0000000005250000-0x0000000005260000-memory.dmp
              Filesize

              64KB

            • memory/5008-21-0x0000000074AC0000-0x0000000075270000-memory.dmp
              Filesize

              7.7MB