Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 07:24

General

  • Target

    8e8e7336cc18b76fd022b9ed76fc6893.exe

  • Size

    58KB

  • MD5

    8e8e7336cc18b76fd022b9ed76fc6893

  • SHA1

    abb4e18d2b8c6a96ae0cb0c23b860ef57456b102

  • SHA256

    e8e3fd515545eabe4bb0761031df6dd033f1a90a4649103c0a7481359b13c804

  • SHA512

    817b52828010c36bae92472f26d69c84a60c0e96fc0a28792a4eabe9350ba711a56a74ac3d8bf4b86b91efc5e74369372826445e8480cc27871f52df7adcdeec

  • SSDEEP

    1536:56nR1xTKkqMrbO+08/jtFa46q96QUUosY4zS+Fe:5KTxTLqU1pv6qGUOYM

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e8e7336cc18b76fd022b9ed76fc6893.exe
    "C:\Users\Admin\AppData\Local\Temp\8e8e7336cc18b76fd022b9ed76fc6893.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8E8E73~1.EXE >> NUL
      2⤵
        PID:3668

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4624-0-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4624-1-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB