Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 19:45

General

  • Target

    cc44bfc67c96b1216c1a2fb03a4b2aa8.exe

  • Size

    82KB

  • MD5

    cc44bfc67c96b1216c1a2fb03a4b2aa8

  • SHA1

    0a6cfdd880c3bae43b1eee5673ec80859ceec22d

  • SHA256

    3e4d2943ab33ddc0ee332623962027bb68ae3a956227622428b9579f11192c94

  • SHA512

    aeaa919dfdcfd26cd3aceb40b4de0ff1e66aa3101c6052371dadf21966c0632665094202be208fb644e80e9fa541d010c5f4fe38c6fe94c286408bc462f843ee

  • SSDEEP

    1536:KpgpHzb9dZVX9fHMvG0D3XJlMPtBgdhKZvAznOzxqdpX7ne6rfMawjlCE:IgXdZt9P6D3XJlMPtBYpzOzx4be6zCjJ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc44bfc67c96b1216c1a2fb03a4b2aa8.exe
    "C:\Users\Admin\AppData\Local\Temp\cc44bfc67c96b1216c1a2fb03a4b2aa8.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Roaming\bqwvzl40.exe
      "C:\Users\Admin\AppData\Roaming\bqwvzl40.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Users\Admin\AppData\Roaming\bqwvzl40.exe
        C:\Users\Admin\AppData\Roaming\bqwvzl40.exe --Restart
        3⤵
        • Executes dropped EXE
        PID:1160

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\bqwvzl40.exe

          Filesize

          99KB

          MD5

          0e14a49865b35f083738ed90e36bb16b

          SHA1

          97ac5f852e994e1836c5f3d78df743f4dd4e6c28

          SHA256

          1c59a0eeca0104e735b3cd93aad92c8dbdcbba8928cad8ae66dbaa09227cce55

          SHA512

          9376cad2ae6499d3f2335c837d9b60f9c943266b9fdff73d9e8662fe771b70de6ae5851aaaa0eb362c04c7427d3fbd3c64f82210cb7527e25c57a36a84f8e435