Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 14:45

General

  • Target

  • Size

    11.1MB

  • MD5

    0972c39c74f33c2ce17a9f9f09699c5a

  • SHA1

    975a19e118617eb362cd59df7997e54fc464c31d

  • SHA256

    4dd9c958a16b5b360a1fa1a253df9cee7d2c0ccd8650056f1e9ad000f32f21f4

  • SHA512

    7b7d9cbaa1abe236a2a503264aff643072ae51ffb863b0352489d0540f5170c3920c06d885103cf1c20065b3decd183c3c8b3afaa0477aaa06a16dffd60e49c2

  • SSDEEP

    196608:hXlCByq+VL6DdWvMNs+q1WycUKQcX9xMnWFJD7bIt9P1UaoREylb2sMxMT9Y:dlC0q+VLMjG8ycz77MWbD7gqabeisMxP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\#[email protected]
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\#[email protected]"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads