Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 10:28

General

  • Target

    be5fc75b17ee8766caf25d3063ecb660.exe

  • Size

    31KB

  • MD5

    be5fc75b17ee8766caf25d3063ecb660

  • SHA1

    c7d59a543399802cd434a0795f9e8e9c299690e8

  • SHA256

    0db1d5238ef773144a118f17f5f354c705a9796f12fe36829cb169b59344fab3

  • SHA512

    47e6d6b74da325dd8f310ea256d5a1202766a842ef6633a176fe924cf917455bae8841d732b53080d4718150aae9bca037603ad76ade05ef563bfd0efc16dd8e

  • SSDEEP

    768:AzCzDHjqcg3fwgpYK/k59zck/fDBmaXjWDrNKgU6:fM3fiXjWvNK2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be5fc75b17ee8766caf25d3063ecb660.exe
    "C:\Users\Admin\AppData\Local\Temp\be5fc75b17ee8766caf25d3063ecb660.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\plote.exe
      "C:\Users\Admin\AppData\Local\Temp\plote.exe"
      2⤵
      • Executes dropped EXE
      PID:2136
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4064 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\plote.exe

      Filesize

      31KB

      MD5

      c047b23814edcd7cf6e543b0f1e625a9

      SHA1

      e17935ae125f4ac3c8bd6cc9b3ed5ac7f71cb05e

      SHA256

      e752b15594a328ff568c099899269b95d9e9bd690b571f63cc767b62adb4e74c

      SHA512

      d1eab0afa0002e8972ceebb61af12d97653f4cbbbca82854b9d5cda1f6b1fddc2ca0101bfbd3cc5bf292141af12f034f507e3b0072c9ec6b56245e49346fe529

    • memory/2136-21-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/2172-0-0x0000000000730000-0x0000000000736000-memory.dmp

      Filesize

      24KB

    • memory/2172-1-0x0000000000730000-0x0000000000736000-memory.dmp

      Filesize

      24KB

    • memory/2172-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB