Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 04:13

General

  • Target

    c5c610d5b50f0fb37b008a00a3da27c0.exe

  • Size

    66KB

  • MD5

    c5c610d5b50f0fb37b008a00a3da27c0

  • SHA1

    a4eb226dea01c50f6d82b8844996340ed995c5f3

  • SHA256

    a2c530274f924ea7cdb18a0a95ee19a84606c78ea48b6f8663655f7c70db9533

  • SHA512

    0d5310984dd795130dc881a6596c8eda57cf93850756c2cd80877f627ba4315a9def72fdedbc7fc9c565a0ee0e49f01c8ad7ebf57272a269cac5d3b8305dac82

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpE0P/xFY:6j+1NMOtEvwDpjr8ox8UDEpN/jY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5c610d5b50f0fb37b008a00a3da27c0.exe
    "C:\Users\Admin\AppData\Local\Temp\c5c610d5b50f0fb37b008a00a3da27c0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    66KB

    MD5

    7f82c9c7ce3d2803f0cbe3da1ddec00a

    SHA1

    2ea3df12fb0af61b52067fe98da2655ecdb149d0

    SHA256

    aad8c72d6e6c9957ee58a584aff22b9d5cd7fd72c2748b047b0a3d7556e2f19b

    SHA512

    bf20291a77282988af06a7445e28c07bf34b942edf9e4cdb1f53150acca0e3a165fb899e7bc6f0202072ef7fe4d831c15c12a393a6c9274647ff13419ba5e6b0

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    8KB

    MD5

    b4873ed0102a82706b9a56b8ca30f92a

    SHA1

    47c30c6a8e0ed27cd6893f64236d71cb396d4c46

    SHA256

    b2e4d67bbcad0e6d43ae467b50b0a8c336bdace20d36908889fcb4fb94b577bd

    SHA512

    96276940f86bc9d0c1fd126de877aa87c2ecb66deda9a71c91a8da839e326ec6207f6365da77ace3b29e1e2c368ddcec56c39b4f10ce90a56b669fdea7e1abe1

  • memory/2056-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2056-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/2056-2-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/2056-3-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/2056-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2200-19-0x0000000000760000-0x0000000000766000-memory.dmp

    Filesize

    24KB

  • memory/2200-21-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB

  • memory/2200-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB