Analysis

  • max time kernel
    92s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 21:23

General

  • Target

    DrBoancfg.exe

  • Size

    556KB

  • MD5

    8249122b4ee495fbf6c57e5acbe61f30

  • SHA1

    adc2240bf074742e8bf51ed81c710ff6e21148a7

  • SHA256

    e99b9b64766b41d903440ca9ddf081d83cc96d8766c82cb2836828a1d63bda45

  • SHA512

    3a331d1829fa32c4120be21aab3c4dc9a30bc86c6967c1dd7064b65b14d218ce6a3cbdfd4b1238fcca11d6ef88d69c6d53cb717eaf5a535487721c74d9333f73

  • SSDEEP

    6144:NMsS2dujTfHkwWpo0nQ071oY08IWdOARrGcsicw/rs3AMbkq6cuQF0lY5:NMsBhwWm0xIWIARrGcOvA8kq6HJG5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DrBoancfg.exe
    "C:\Users\Admin\AppData\Local\Temp\DrBoancfg.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\DrBoan.exe
      "C:\Users\Admin\AppData\Local\Temp\DrBoan.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /tn:"DrBoan" /run
        3⤵
          PID:4920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads