Resubmissions

20-05-2024 14:15

240520-rk2wqadd42 10

18-03-2024 04:21

240318-eynvssgg9w 7

Analysis

  • max time kernel
    133s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2024 04:21

General

  • Target

    25704a9ffe807caab1b7f0800f22692f.exe

  • Size

    981KB

  • MD5

    25704a9ffe807caab1b7f0800f22692f

  • SHA1

    61c2c9d62e14410a079746ab6c3272e3ba1e926d

  • SHA256

    bb878d54b68e3be71f2e61cd0e3a8f554a401b49204f76332fad3f8d4960f668

  • SHA512

    70fa6a3551573fac4b1a2852a7bb679c2a641ff62a7a597a5978984a61e8d7e467335e5b31c21d17ea76b855574baaaaa4b11417d42c7529bd757ccc693b6656

  • SSDEEP

    12288:fn4noCPJgCmEAK/frrzBmx7ByirqLVnU93t8dLB0w9LAhDHzqO4tq9q/47QrcSNw:fn4JPRnDJmx8UUVnUpil9LAf4tWoP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25704a9ffe807caab1b7f0800f22692f.exe
    "C:\Users\Admin\AppData\Local\Temp\25704a9ffe807caab1b7f0800f22692f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\25704a9ffe807caab1b7f0800f22692f.exe
      "C:\Users\Admin\AppData\Local\25704a9ffe807caab1b7f0800f22692f.exe"
      2⤵
      • Executes dropped EXE
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\25704a9ffe807caab1b7f0800f22692f.exe

    Filesize

    981KB

    MD5

    25704a9ffe807caab1b7f0800f22692f

    SHA1

    61c2c9d62e14410a079746ab6c3272e3ba1e926d

    SHA256

    bb878d54b68e3be71f2e61cd0e3a8f554a401b49204f76332fad3f8d4960f668

    SHA512

    70fa6a3551573fac4b1a2852a7bb679c2a641ff62a7a597a5978984a61e8d7e467335e5b31c21d17ea76b855574baaaaa4b11417d42c7529bd757ccc693b6656

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\25704a9ffe807caab1b7f0800f22692f.exe.log

    Filesize

    660B

    MD5

    1c5e1d0ff3381486370760b0f2eb656b

    SHA1

    f9df6be8804ef611063f1ff277e323b1215372de

    SHA256

    f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a

    SHA512

    78f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743

  • memory/2276-14-0x00007FFF87E40000-0x00007FFF88901000-memory.dmp

    Filesize

    10.8MB

  • memory/2276-15-0x00007FFF87E40000-0x00007FFF88901000-memory.dmp

    Filesize

    10.8MB

  • memory/2384-0-0x000001D1B2AA0000-0x000001D1B2B9A000-memory.dmp

    Filesize

    1000KB

  • memory/2384-1-0x00007FFF87E40000-0x00007FFF88901000-memory.dmp

    Filesize

    10.8MB

  • memory/2384-2-0x00007FFF87E40000-0x00007FFF88901000-memory.dmp

    Filesize

    10.8MB

  • memory/2384-10-0x00007FFF87E40000-0x00007FFF88901000-memory.dmp

    Filesize

    10.8MB