Analysis

  • max time kernel
    145s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 10:33

General

  • Target

    a38f376a437793ccffc4fd6fda4f828d.exe

  • Size

    81KB

  • MD5

    a38f376a437793ccffc4fd6fda4f828d

  • SHA1

    07f8deae8c687c2cbe400804ef02971217ccfe00

  • SHA256

    1b4c4274c152abaa70081d7702d49d9d2be48695701c0fb0d753ea9c84adb029

  • SHA512

    c2e95e7d7d741c36ccf121f0c860e8817179b69806e0a9555833a665c23d16699976d9302c2ac531e85e11dfbd4e4ea4dfd181fff6e5a5c45bd4b3d7faea14a8

  • SSDEEP

    1536:7cl7zKDfLplVKcBDdbNzfLVm2wm3e6XVTWfsvFM9sYf8jm3s20mRuYWlij:7wzGfVKcD7LI2wmHVWfsdM9sYkkluYWl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a38f376a437793ccffc4fd6fda4f828d.exe
    "C:\Users\Admin\AppData\Local\Temp\a38f376a437793ccffc4fd6fda4f828d.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\SysWOW64\msiconf.exe
      C:\Windows\system32\msiconf.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:1944
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A38F37~1.EXE >> nul
      2⤵
        PID:3540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Thumbs.db

      Filesize

      14B

      MD5

      9b3f9a963a6fa0dd8654fcbb1fe8c787

      SHA1

      087c9a28cd822c703c1545e8f8edb9f23f5e160a

      SHA256

      67c71ec4ac6068796fa5a7624a178e3f4a33ac4c273e8ed30a9c7942d47b3d39

      SHA512

      41962a180bd11ee65762b714ddbd59663702734e7be7d01afb32e9e2f7592031b5dd3b1cf329368148ebb06a5853900528eda6c3562455f004835885c17b2753

    • C:\Windows\SysWOW64\msiconf.exe

      Filesize

      81KB

      MD5

      a38f376a437793ccffc4fd6fda4f828d

      SHA1

      07f8deae8c687c2cbe400804ef02971217ccfe00

      SHA256

      1b4c4274c152abaa70081d7702d49d9d2be48695701c0fb0d753ea9c84adb029

      SHA512

      c2e95e7d7d741c36ccf121f0c860e8817179b69806e0a9555833a665c23d16699976d9302c2ac531e85e11dfbd4e4ea4dfd181fff6e5a5c45bd4b3d7faea14a8

    • memory/1028-18-0x0000000000530000-0x0000000000560000-memory.dmp

      Filesize

      192KB

    • memory/1028-1-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1028-2-0x0000000000530000-0x0000000000560000-memory.dmp

      Filesize

      192KB

    • memory/1028-3-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1028-4-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1028-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1028-17-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1944-13-0x0000000000480000-0x00000000004B0000-memory.dmp

      Filesize

      192KB

    • memory/1944-16-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

      Filesize

      4KB

    • memory/1944-14-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1944-20-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB