Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2024 01:28

General

  • Target

    1df63f6522f3f9dd7db737a0b71be436.exe

  • Size

    34KB

  • MD5

    1df63f6522f3f9dd7db737a0b71be436

  • SHA1

    36839e97bf43240b064444d07c0badf57b52949c

  • SHA256

    81bb92876afdbb551292028fb7ee5560280d57a1e6e436d1688de3c1d0e6790a

  • SHA512

    0974be7377adbca3f777199f0c910228879bd1a43d85793490a9c8ba81a28619249b073b97ae27446dc059ca478351d471292d958dc329cb3ade7617de6635f3

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EI4:b/yC4GyNM01GuQMNXw2PSjH+Pk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1df63f6522f3f9dd7db737a0b71be436.exe
    "C:\Users\Admin\AppData\Local\Temp\1df63f6522f3f9dd7db737a0b71be436.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:4024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    34KB

    MD5

    87fc6e852d9f0ec31bddcd7099d017cf

    SHA1

    a6c6ef3b3f1113e75df758b3c67db41cd1e97ea0

    SHA256

    2bfd93189979f2124ab37c614570d1e77e9a3adb6aaac7e9b470b12b9aff451b

    SHA512

    d52b3481e26b8ec108aba9550fd604cbf38588618a602fa61079af3ee38de32c54bff149ed9b76982d580eef5706c799a8fbaf90cd2d87c7c654a28879da8211

  • memory/4024-17-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4432-0-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/4432-1-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/4432-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB