Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 09:48

General

  • Target

    17b278045a8814170e06d7532e17b831bede8d968ee1a562ca2e9e9b9634c286.exe

  • Size

    868KB

  • MD5

    0981f1145c1cec6a5de51c7d585affe3

  • SHA1

    9adfc833aa773a81d2d5b101027417c57f6d343f

  • SHA256

    17b278045a8814170e06d7532e17b831bede8d968ee1a562ca2e9e9b9634c286

  • SHA512

    52c59c8e6c6eabcd712dc4e66093f62e6c486d3784e445cb5144c50bd6b376f09a8169e2dc36da31b03163edd1a33dce00305b16e6b31ff0914d7cbf10617e68

  • SSDEEP

    12288:yPgtJQXBDj5yo6kkWRS05K6Jrz+EW3QL+1xXnKfVM6fkjuJ03Fl7bE:MYJQXBD1ekkbSK+HsoAxXnsr21l7bE

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17b278045a8814170e06d7532e17b831bede8d968ee1a562ca2e9e9b9634c286.exe
    "C:\Users\Admin\AppData\Local\Temp\17b278045a8814170e06d7532e17b831bede8d968ee1a562ca2e9e9b9634c286.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\SysWOW64\wscript.exe
      wscript "C:\Users\Admin\djyvzrzokpcrajgbhf.ne" //e:VBScript //b
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\System32\ipconfig.exe" /flushdns
        3⤵
        • Gathers network information
        PID:4336
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\System32\wscript.exe" C:\Users\Admin\abide.lnk //e:VBScript //b
        3⤵
          PID:2448
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5060

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\abide.lnk

        Filesize

        8KB

        MD5

        6324ab6adec785aecd59de7f2a3569ff

        SHA1

        f2128ac9c68f314dd57239c619a1998a4f636d0b

        SHA256

        0ff6dcb990a21623e985a4ecb3563809873392d6aca31f8b012df5bbe9bdb709

        SHA512

        71d192afcef81405308845bddfcb450e92deff56ad887dd668bac64c2a1fd48f3e1ba412d5c42a34df510aa79b9372923fea1bf865bd7ac3482800c3a96a22fe

      • C:\Users\Admin\djyvzrzokpcrajgbhf.ne

        Filesize

        3KB

        MD5

        c361193bb5b10d234c6482f86886ba7c

        SHA1

        2cdb72f699ec816cb35a4179d4bc8e8ca8982d44

        SHA256

        72998ad4f57641bf5ae000ef4f2b23d3f8f6a6297f0268df66982cf144a349bd

        SHA512

        7c6bb3bf8aafbe47f173c7552fe83e74e02cbf711b68c3e297fc49efac2ba3c6ae6b1bd48b49dc80f75eb5d3ed92d273a3ad213c32d2174f490fa4d9ac5b41fd