Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 12:17

General

  • Target

    Strategic Planning of Reserve Bank of Australia FY2012.exe

  • Size

    159KB

  • MD5

    65ad95116e3f9aff05663adc1cda8062

  • SHA1

    3b86769537629f994d7ec69b8488e5a913c56d13

  • SHA256

    dadfb256011a0e585af106b2586809815c07dfdb52f6a8afb144386c946317a0

  • SHA512

    cfff1ce5dccc7faf2c52bae10550f28221afe1d3495165aedb8fd76f1eb557cd822f29a232d34efb0bb3533d01b5bd96c28bb122560e9c6505876df5ee1a2ee9

  • SSDEEP

    3072:S4lRkAehGfzmuqTPryF9qC7eQqyc8DZkWpWLPakQwdgOyYLF:S4lRkAehaKuqT+F9qCSQqr8DZDpWLGwP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Strategic Planning of Reserve Bank of Australia FY2012.exe
    "C:\Users\Admin\AppData\Local\Temp\Strategic Planning of Reserve Bank of Australia FY2012.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\internat.exe
      "C:\Users\Admin\AppData\Local\Temp\internat.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\internat.exe

    Filesize

    7KB

    MD5

    0b671af4caea5f7a3fdb5600d51fc158

    SHA1

    72dded4af3ecdbc51e7225c499d429b265df8018

    SHA256

    6ac280bbdc21a14caddd92bf8078870dc46e7a0c392931ce901ce79f25219959

    SHA512

    22f3eef01d68bf8ee6e203b221cfd5c670cb056377badafe3dde4a521dd7944fb541e180c75fdd4dfe5408bb45f4eebcb9dcae84a6fe6443f2a23cb17afd0c78