Analysis

  • max time kernel
    91s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 02:10

General

  • Target

    85a6fa519c6246df21f871416b5081eb.exe

  • Size

    147KB

  • MD5

    85a6fa519c6246df21f871416b5081eb

  • SHA1

    2ec7401aa0ab916ae793195e2d8a742f40a4b7df

  • SHA256

    953a4faee2dd24df96ad4b6f678b7127d09ee3a0381eff838d86129c8227d9e9

  • SHA512

    4c684d85ea241ce7e37e47573cb2b76af250d68a068f0473b8143a912ea6a13f763a6702eebe254b18b558431df79d1c845786e698bcfe6d0dc1582a86eb941d

  • SSDEEP

    3072:wggXnmCQXqSQHW2YEDzNturn7WfsWChakHdY3b9BYvukO2:wggXnm16pWMturifsW6W7sukO2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85a6fa519c6246df21f871416b5081eb.exe
    "C:\Users\Admin\AppData\Local\Temp\85a6fa519c6246df21f871416b5081eb.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\2.exe
      "C:\Windows\2.exe"
      2⤵
      • Executes dropped EXE
      PID:1856

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\2.exe

          Filesize

          129KB

          MD5

          ecd5db09b41418ede7228193d5d64d6a

          SHA1

          2ac7812be6d59e742e0bc4206b8b7ae0f7c7f878

          SHA256

          ba6281f915d44202fb4b945b991ba4af1e18d6cc03d4b564d58cbb04deca98b5

          SHA512

          4930b4315233a76edf4a842f833b006d9e067c587c4015faf36a2bdfd805762d16f9995fc6d2781fd2a1a2d4fbed4691ea053205b4a0ef41e3049268b6734d9d

        • memory/1180-0-0x0000000000400000-0x0000000000427200-memory.dmp

          Filesize

          156KB

        • memory/1856-9-0x0000000000400000-0x000000000044D000-memory.dmp

          Filesize

          308KB

        • memory/1856-10-0x0000000000400000-0x000000000044D000-memory.dmp

          Filesize

          308KB