Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 02:08

General

  • Target

    afbf1e8aa854ae1b99778a0d99d61eb9a45ddf2a44c9075d1ac5d6104971930b.exe

  • Size

    81KB

  • MD5

    8bb6bf26a377c42cea7f6405f9eeb7fc

  • SHA1

    1f074041cf13fcd81ca4a9eff59f72c0e1dcfdb8

  • SHA256

    afbf1e8aa854ae1b99778a0d99d61eb9a45ddf2a44c9075d1ac5d6104971930b

  • SHA512

    4467fd1cb32e2333b050947a4b7ccd4f983815d6a412dfa82e0c0d2fbeb31611d725c4e5084f68eeb65c7366fe7a8f14f18f2c2a108fc6ac8d7b49d61489d3fb

  • SSDEEP

    1536:qk4e0VCI33T++C1uaeN6ytQteVmhwHfAjU:hNO3T37

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afbf1e8aa854ae1b99778a0d99d61eb9a45ddf2a44c9075d1ac5d6104971930b.exe
    "C:\Users\Admin\AppData\Local\Temp\afbf1e8aa854ae1b99778a0d99d61eb9a45ddf2a44c9075d1ac5d6104971930b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\AppData\Local\Temp\edurss.exe
      "C:\Users\Admin\AppData\Local\Temp\edurss.exe"
      2⤵
      • Executes dropped EXE
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\edurss.exe

    Filesize

    81KB

    MD5

    44a9eb83b9adec7837d2087daf43ae9e

    SHA1

    8a6a29246600da886aa18f0e999fe90255f7a69e

    SHA256

    797b97e53fafd18c0a5669daa290250cb74e29bcc78ad74426e3e474b4774a02

    SHA512

    15bb8aab7c433ffb29d196acf1d86bd92716a1bbc8c2b30bd42dd8c0e0a82508bce04943464430299d6da526eddf402e2257979ff1b5a0082ee07febefb0f6e1

  • memory/4788-0-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/4788-1-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB