Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 07:13

General

  • Target

    7f377bce36f0fb85e337daee2421a252.exe

  • Size

    13KB

  • MD5

    7f377bce36f0fb85e337daee2421a252

  • SHA1

    2536fb30a583d81012e87f386317ec096362c6a6

  • SHA256

    a566a016e89fc9ababd27b6dc35d35a402c6e8a561660985578b3066b25e0f43

  • SHA512

    ed5c726d0552ef7f168949a92c18e74006bef0a5fe733be7bcac3e9c85b5fb522f6defec21a6d0e3142be10605adc2c46b1b335122c971c79602d32be432afc7

  • SSDEEP

    384:WvpF/6oNYqKxXxDHyZ3ubQKt2TghYFFdeYXP:Wxx6oJoxDH63ubXkTgmBX

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f377bce36f0fb85e337daee2421a252.exe
    "C:\Users\Admin\AppData\Local\Temp\7f377bce36f0fb85e337daee2421a252.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wewt0.bat" "
      2⤵
        PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\wewt0.bat

      Filesize

      274B

      MD5

      73541c95d9908af7c01f2c418649faf7

      SHA1

      08a37dd54d354d8adf9b3d18dae34f1df2985a5e

      SHA256

      44be82eb14f5776add8df87a7ccff2bc7a3ff608ddfa72dea7ca6c0e8ad3c44b

      SHA512

      7ceaa9c11d8aeb5a29f2fd00dfa2d99102b212a40a28aa0d654972d144772fc3ba1c9d79bca23640a0e9dd7dc7ca14aaa68e0c165745b080faee94ac5071247f

    • memory/2804-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2804-1-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2804-3-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2804-5-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2804-10-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB