Analysis

  • max time kernel
    145s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 01:35

General

  • Target

    79a603d2e2ffb39e878abf6dd94c43f4.exe

  • Size

    44KB

  • MD5

    79a603d2e2ffb39e878abf6dd94c43f4

  • SHA1

    6690fdc717d06b6603ce459cbdec1a557e08e6d8

  • SHA256

    e45bbbda2f452d3fec8ecb43da9a16ac4af85f5a029933e32b126712ca1cad56

  • SHA512

    98719b4c972ab34773c5ca48e2d67f2f285c8ca1b3411717e20511ace382937326a369791ad58241da9c55988eaa1b52d51389189b051f6a3667aa8d42b8c826

  • SSDEEP

    768:btB9g/WItCSsAGjX7r3BPOMHoc/QQJP5WPK:btB9g/xtCSKfxLIc/uS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79a603d2e2ffb39e878abf6dd94c43f4.exe
    "C:\Users\Admin\AppData\Local\Temp\79a603d2e2ffb39e878abf6dd94c43f4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    44KB

    MD5

    bc60a1969b0546ad6d4e82b18aef5471

    SHA1

    f2c6fb0a8b0171037e6b3bfe08e9af73a87cb052

    SHA256

    8812d52545cbc72b330cfd611d410b0d363eb4b89b0c10bfdcc8754ed6dd4c86

    SHA512

    0cf001ab22cc32400b68855709ee2b6f4f995717c0da6b5af2362fb363ed5ee45dc27623cbfa6b13d00a56df5afc3c25a9afe622fcf5dfdfdbbab0515265a803

  • memory/640-21-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/1828-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1828-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1828-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB