Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/02/2024, 02:47

General

  • Target

    63a855c21325fdba540c13b5710f55ff.exe

  • Size

    45KB

  • MD5

    63a855c21325fdba540c13b5710f55ff

  • SHA1

    3b15ab88bf531b5c62a9eb948342feb375433dec

  • SHA256

    eecd4103b77a579002516585a296a32af54b4e74c8903ce36f070f524d957d91

  • SHA512

    d18cbc4c1e69dd52e81c17a1d5dd4b46e9c5e429cea6f4f7637a42354b3fee7878a514792c76ebd8ccd605a6d558c805d1e98b8f3266d9b2381019118c457250

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/WZrEu/d+qmsUHQ1wsH:ZzFbxmLPWQMOtEvwDpj386Sj/WprqQ1J

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63a855c21325fdba540c13b5710f55ff.exe
    "C:\Users\Admin\AppData\Local\Temp\63a855c21325fdba540c13b5710f55ff.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    45KB

    MD5

    cf8f7c589f540add7ad70039c82c8334

    SHA1

    18e9be8588d8f3d574b3cfc5974075af990a53af

    SHA256

    f62582b74b04014178e5b5abc32eeb25a6e9d25239705b01880fa36c1ae6641b

    SHA512

    6e2aad6c5ffa770369c73c018fca9e27ea986865944d35ac849c6ea72359b04954cb9fc308cc88aabfc39e8f064cb1caca54e103a6afc8c383b66a7474b2f4c8

  • memory/4724-22-0x0000000000630000-0x0000000000636000-memory.dmp

    Filesize

    24KB

  • memory/5092-0-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/5092-1-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/5092-2-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/5092-3-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/5092-17-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB