Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2024 01:07

General

  • Target

    0d8ad34f006a2e684125247059564e68.exe

  • Size

    46KB

  • MD5

    0d8ad34f006a2e684125247059564e68

  • SHA1

    f1d00c5f8fcbd3f14a006aec1bfb9c348de37f39

  • SHA256

    55c0aa56851bec1705b6900f1d23add4ca97f446a327de6d550dd4ed43da2150

  • SHA512

    115fcb8abed3d8551bc4f05280e4c9f3b6ca5bb7c7833ee5f5521c0cf5bb6554bae5ee131e1ae582bd1c5e33754eb12f0c775d66c73ca346d348a84b6cbdacde

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6IMhyXp:bgGYcA/53GAA6y37Q6zQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d8ad34f006a2e684125247059564e68.exe
    "C:\Users\Admin\AppData\Local\Temp\0d8ad34f006a2e684125247059564e68.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    46KB

    MD5

    7076666cfbb600a8b9ad2de59110407f

    SHA1

    ab301d28225acd40383383477b7d530823016c1c

    SHA256

    3442dc77b607dfd67a359ada32d679f7b6da422c4000c1ae7236fbb4c84f1f67

    SHA512

    8f09c02b241f7edb33032080d3fff9994300ce55f7d914df1b97a095ddd760dde58456b1a9c0588dae21fd3afa1407782504c8db9b8fc2a91b454eb7c9206f47

  • memory/2312-17-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/2312-18-0x0000000001F90000-0x0000000001F96000-memory.dmp

    Filesize

    24KB

  • memory/3184-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/3184-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/3184-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB