Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 23:57

General

  • Target

    bf4bc0ddf192281fe2774cfd7f60896c.exe

  • Size

    101KB

  • MD5

    bf4bc0ddf192281fe2774cfd7f60896c

  • SHA1

    fbb87055f0d7f43c48c2e4b26abd093271c3ee36

  • SHA256

    31851b2a9b4054803474a5cb89c1539633a2fdc9ea4eb86e3bca8e42266c9d75

  • SHA512

    fa43865d394ecf8aa97bbc7c0fa43c91acbe8b64812644c00f5aec1ff243a34c34a43e1f1bfae16b2a25cd8b2f1aaeb71939b540718e2beaa96b55fcb34ed06d

  • SSDEEP

    1536:2acleXQ/05IFeV9jtm80BykH39gjnZAPPDr2WHFv/qJNj2:2VeA/jFe7jtF+XH3GADrVHFv/qJB2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf4bc0ddf192281fe2774cfd7f60896c.exe
    "C:\Users\Admin\AppData\Local\Temp\bf4bc0ddf192281fe2774cfd7f60896c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    PID:2968

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2968-1-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2968-0-0x0000000000220000-0x0000000000240000-memory.dmp

          Filesize

          128KB

        • memory/2968-2-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2968-43-0x0000000000220000-0x0000000000240000-memory.dmp

          Filesize

          128KB

        • memory/2968-44-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB