Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 02:17

General

  • Target

    7b7970b7daf44aa61fe5c3ea420c276c.exe

  • Size

    35KB

  • MD5

    7b7970b7daf44aa61fe5c3ea420c276c

  • SHA1

    019b98d1c95c3ce9d3eced4b4115d3a39dfba2c9

  • SHA256

    7a11c6cc4b69ebf8ad0a2438bcecf86cea631a0a0abbfeaa8e533c51271d6c02

  • SHA512

    eb8f0a22c726786791f8936c883031d6a1fc53c019ee709cf51268817d274e1c251a1b747fb54a95492c61e9d5eea46d10a1886d7bdaab7cc994ccc94dd74a2f

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7cCv:bxNrC7kYo1Fxf3s0cCv

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b7970b7daf44aa61fe5c3ea420c276c.exe
    "C:\Users\Admin\AppData\Local\Temp\7b7970b7daf44aa61fe5c3ea420c276c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    35KB

    MD5

    289df9331a7c9e4d7eb056514f9b6949

    SHA1

    d23fd7bf76dc788769f0a468388417f2870c028e

    SHA256

    2dc7504338741e69a0edcfd01c35076190c34d719ca070032aa36daa193b6540

    SHA512

    2574d0a5b1a2efa76cc8efb57b96b709a66c848c6976f0f28d08a8d7996d84e803bd769beb02cb0209c2a995aead9782ff10cf52d2843c3635a6f978deacefc8

  • memory/2136-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/2136-19-0x0000000002020000-0x0000000002026000-memory.dmp

    Filesize

    24KB

  • memory/5000-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/5000-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/5000-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB