Analysis

  • max time kernel
    130s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2024, 02:01

General

  • Target

    d7a072d745812b256105d1099dea334e.exe

  • Size

    99KB

  • MD5

    d7a072d745812b256105d1099dea334e

  • SHA1

    99f99e6a9bb0e43000a9ef975d2385f2e0bb1089

  • SHA256

    082e74d7aa6410e661c4f9576d4b08baf3c43ce661d39328ca8a67a30a00c60c

  • SHA512

    7c2df5c3ed433bab05ca069964e27dc9a805f6bae15a404e6b9abce2304d19baf539485aaa13a06ad939336a67d5141f0a851930839a8f594908ff2cd7d5fe49

  • SSDEEP

    1536:/VWbLHuY1NKmaPgV/rURjxOFkUpJRlrP2ulw:9WbLHuY1vV/gBaffruP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7a072d745812b256105d1099dea334e.exe
    "C:\Users\Admin\AppData\Local\Temp\d7a072d745812b256105d1099dea334e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    PID:1056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1056-0-0x0000000000220000-0x000000000023F000-memory.dmp

          Filesize

          124KB

        • memory/1056-1-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1056-42-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB