Analysis

  • max time kernel
    445s
  • max time network
    451s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 06:25

General

  • Target

    Loquendo.rar

  • Size

    181.3MB

  • MD5

    240ea62a4537e75e7c955bbab341b17f

  • SHA1

    79b4fc9c1801ce31a3586caed0544da28949996c

  • SHA256

    2afeede38bbc3e601522205089c7cef1b0267c61b8e61fdb22fb9b7c95a228d2

  • SHA512

    fe039989459c7de9c83e8d762aae7cc3dd553cf0639215df48de01c8045db829e432131ec8ab6b3e4db5aece45c158e6af02b63c2b61d15e09bdf405dab28d3f

  • SSDEEP

    3145728:2uow1btF/50sYoapKrx5kgBYD/hm5biZ7f7Z4Ht87sagnMXljeFMGxKbW+we6EE9:cs5Fqtw5DBsM5bilTZ37RjeFM6KbW+wx

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Loquendo.rar
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Loquendo.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads