Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 18:51

General

  • Target

    d44255f79b1577c83129f48d49cb3230.exe

  • Size

    115KB

  • MD5

    d44255f79b1577c83129f48d49cb3230

  • SHA1

    5c17d130bba915db601854257e1d1bb860de4a76

  • SHA256

    1709929db6a4d9dfcc74284e50a2e1420eb7ed1229a762464a556ccea3cc9ab2

  • SHA512

    05d3537083535059698d4cfafb7b10511014174ffd22142c4f792a8d565f2a96ac4c9c3164b0a76d012dd7f51a34f13784f260c0fd873b4a24bc52b82bd37b25

  • SSDEEP

    3072:rvkGO9TMGNG0WycxnvdwOxQZbGL6msFhx2DmxA2:TkGmMGky+iO+GCh0DMz

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d44255f79b1577c83129f48d49cb3230.exe
    "C:\Users\Admin\AppData\Local\Temp\d44255f79b1577c83129f48d49cb3230.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Eqb..bat" > nul 2> nul
      2⤵
        PID:1476

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Eqb..bat

            Filesize

            210B

            MD5

            885f1d884698920e4d67119537a99b6d

            SHA1

            a32873b01999f3890c14a9bafed33766ba5623bf

            SHA256

            cad29809bd084b6b9332031551751c2fa8e8d8bebf4e1c9d664776016e413de7

            SHA512

            48d85684fa530a3fb1f0d18bce45667a1b81569a4a089ac86245abef03d16bd373ef40b835ed489f32b79c7bcd8e88d4c510c7e780af6ad9c24c02c46e13c5b8

          • memory/840-0-0x0000000000190000-0x00000000001A0000-memory.dmp

            Filesize

            64KB

          • memory/840-1-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/840-3-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB