Analysis

  • max time kernel
    136s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-04-2024 20:44

General

  • Target

    3f637b93d9a5664b43f46ffd75d350b275816f8b7a084cbe563a670a4a6fc1f3.exe

  • Size

    245KB

  • MD5

    64eb0a8b6f772f26841fdd63755f2987

  • SHA1

    225d397812ed26e075e126fc587a5380bd79870c

  • SHA256

    3f637b93d9a5664b43f46ffd75d350b275816f8b7a084cbe563a670a4a6fc1f3

  • SHA512

    e467d537836f6b7dbed52b71b84246b3c3f3363e3dab37c7519aff5aec5031764dee86f07d97b9a4f662035b7db2f1fd610559bb7c4dada10c6a2f9d01931a3c

  • SSDEEP

    3072:9vVQLIkLWeaA8KlCph9GrowNM77sap/y5n2QTOq:NVbk6pNQOri8lp/y5nh

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f637b93d9a5664b43f46ffd75d350b275816f8b7a084cbe563a670a4a6fc1f3.exe
    "C:\Users\Admin\AppData\Local\Temp\3f637b93d9a5664b43f46ffd75d350b275816f8b7a084cbe563a670a4a6fc1f3.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Program Files (x86)\540260fd\jusched.exe
      "C:\Program Files (x86)\540260fd\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:5108
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3900 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2308

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\540260fd\540260fd

      Filesize

      17B

      MD5

      7bdf61d37c9adf3e1c6937107016091f

      SHA1

      56b8e0c454f9dd16d508a04b3afa7e458453ac41

      SHA256

      4c57d86c256214baa0a5a3322ef5cdd575210455b7e964ad60382bd9d4be12e0

      SHA512

      ff4fc1a427c84f47042375749f45ee6edea73b902ae977f14243ebceb7b9a28f41fe5dd404e3ea381754d9122202bc6b61ed0152b20a1c1be76c225dd20861d1

    • C:\Program Files (x86)\540260fd\jusched.exe

      Filesize

      245KB

      MD5

      09facb410d94aa0e23d7bcaa36ddc9e2

      SHA1

      df921b6e73deee785354f10f785c68528c59228d

      SHA256

      95033f950b388f7903f158279fbeb5f45e225a9094a9c825e06bf9e823ce952a

      SHA512

      3428f787cdbc5c0398888fbeb49a8f0344a52b99cbbd523dfe2978b4c73f01f621eec1bfac902c729007b286b021c67376552c3a3949028b3e165dcbcaff112a

    • memory/4300-0-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/4300-15-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/5108-13-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB