Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2024 19:41

General

  • Target

    5e497ce4a80820a43a2df1fca47b722586e8788c78df541b47cb7f7266d7a1ee.exe

  • Size

    38KB

  • MD5

    3d2a1e5c77eb9cec2cd138b4c91c44f5

  • SHA1

    27f0ffea1cfe1b67552159c3f2c17687bd2eb628

  • SHA256

    5e497ce4a80820a43a2df1fca47b722586e8788c78df541b47cb7f7266d7a1ee

  • SHA512

    093a6d1078be49908381defb6d44ad48333d6a3a9eab203a69d1947a46217a96a73dfdec57881ed6b2e5b947770bc82b02fd3b65e4952d33c4674f81ba3f6a62

  • SSDEEP

    768:ac3C4zd6wl2oVZ3eNU6+qbs8ERJe4vzNT6oG57pHHIzniSfRZt+fkyR+i4HvG0T:aOHdYoVZuNUsdJmNLmHIzniSfrtu94HF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e497ce4a80820a43a2df1fca47b722586e8788c78df541b47cb7f7266d7a1ee.exe
    "C:\Users\Admin\AppData\Local\Temp\5e497ce4a80820a43a2df1fca47b722586e8788c78df541b47cb7f7266d7a1ee.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\winmain.exe
      "C:\Windows\winmain.exe"
      2⤵
      • Executes dropped EXE
      PID:4784
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_DelItP.bat" "
      2⤵
        PID:404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_DelItP.bat

      Filesize

      295B

      MD5

      57554da91078f6b203f7a834e1a08c59

      SHA1

      8771cd75f429d79865df9dd363d9667f35005893

      SHA256

      40493148254204552d944711b6c8e88f0c3a3828f03f02b64a54f9b46a4ce2a6

      SHA512

      25b5c21ea2deb11d08d8b07de0abfb2f54f5943fddf1d9e11a708885780d2bb97279ff6efd914bb15e7cbeed8ef7149d5a676433ace57b552e36a3f0b9576970

    • C:\Windows\winmain.exe

      Filesize

      38KB

      MD5

      062c69f008c36de20e31de16596b4380

      SHA1

      61d4f8eb66189c17adae9c87bd5a8fe9809ef824

      SHA256

      484f4dfd2343145aa7d96f013904983c3dd335abbffb7d527eb4c9734c4c16de

      SHA512

      a2de6294a906313a86fbd6ab0fed078f0fc5d552fe0aa318944e02707f232a4c43817ecfeb5e9ae9c86cf124ec45b69d86a0e94293f61b5d6db5a8b22572773b

    • memory/2604-0-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/2604-13-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/4784-10-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB