Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 00:28

General

  • Target

    95c54c27feb6ffdb79c8f85e0d222e7c.exe

  • Size

    29KB

  • MD5

    95c54c27feb6ffdb79c8f85e0d222e7c

  • SHA1

    fa0cb61c1354c2074e29bc93b79c5b99d8c0a148

  • SHA256

    82f66e41ba1f129b78687162e07550f44d0a0cea47ea71ddf8eba485efacfb67

  • SHA512

    19ffdc571c23a99b04c2dff7dfa07c1c6e2a2de1faf687a2a225f6b57b495fd87b863bac771b51436f9c2ef3156362489c3c4289f6e23d17f954048de6b0e3e1

  • SSDEEP

    768:L5gRLUme+TH+enTC6/Ur4xYapnc7cXYHqe:0UmeYHRTkkuWn9YKe

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95c54c27feb6ffdb79c8f85e0d222e7c.exe
    "C:\Users\Admin\AppData\Local\Temp\95c54c27feb6ffdb79c8f85e0d222e7c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul
      2⤵
        PID:1792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\a..bat

      Filesize

      210B

      MD5

      9b6723d60dbe3fada94d8600bc3e91be

      SHA1

      1d1e6d1e4e4b226243b62c7731cbc04f5adc7692

      SHA256

      d3d604365d4172f69b90e93e607896ca86bcd4fee7e2a35e6b7ec96c939b12be

      SHA512

      b8f20998773740045074f8e6caaff996c5ee303b8b39492bc0d07d068b1fd4e72bd7f907dc6e74d65b72a1269d1b55bfe984980ad0ffc63342e2b953eaa40024

    • memory/4776-0-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4776-1-0x0000000000580000-0x0000000000581000-memory.dmp

      Filesize

      4KB

    • memory/4776-3-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB