Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 07:24
Behavioral task
behavioral1
Sample
8e8e7336cc18b76fd022b9ed76fc6893.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
8e8e7336cc18b76fd022b9ed76fc6893.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
8e8e7336cc18b76fd022b9ed76fc6893.exe
-
Size
58KB
-
MD5
8e8e7336cc18b76fd022b9ed76fc6893
-
SHA1
abb4e18d2b8c6a96ae0cb0c23b860ef57456b102
-
SHA256
e8e3fd515545eabe4bb0761031df6dd033f1a90a4649103c0a7481359b13c804
-
SHA512
817b52828010c36bae92472f26d69c84a60c0e96fc0a28792a4eabe9350ba711a56a74ac3d8bf4b86b91efc5e74369372826445e8480cc27871f52df7adcdeec
-
SSDEEP
1536:56nR1xTKkqMrbO+08/jtFa46q96QUUosY4zS+Fe:5KTxTLqU1pv6qGUOYM
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 8e8e7336cc18b76fd022b9ed76fc6893.exe -
resource yara_rule behavioral2/memory/4624-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4624-1-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4624 8e8e7336cc18b76fd022b9ed76fc6893.exe 4624 8e8e7336cc18b76fd022b9ed76fc6893.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4624 wrote to memory of 3668 4624 8e8e7336cc18b76fd022b9ed76fc6893.exe 85 PID 4624 wrote to memory of 3668 4624 8e8e7336cc18b76fd022b9ed76fc6893.exe 85 PID 4624 wrote to memory of 3668 4624 8e8e7336cc18b76fd022b9ed76fc6893.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8e7336cc18b76fd022b9ed76fc6893.exe"C:\Users\Admin\AppData\Local\Temp\8e8e7336cc18b76fd022b9ed76fc6893.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8E8E73~1.EXE >> NUL2⤵PID:3668
-