Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:30

General

  • Target

    SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe

  • Size

    5KB

  • MD5

    a6edc88e45cdddefc02dcaaa6c0ffc2f

  • SHA1

    37ccc25cc0e31a3d26047b13886b2c2072081cc5

  • SHA256

    0833c4e8e1125dbc4ec18d3803be63778cf3cb2d1a77c8398f3b380c1c7e25cb

  • SHA512

    6a890cb1c1a1e2a2ab87604a64ed4d3e2e922fd5753dea55155e0daf3d469388d9631ba5f8cc5f2cae44f178735029952374bdea480481f14988484f274c05e6

  • SSDEEP

    48:6pTlYrITctYG+vLHmCyYfJyMmw9jAUzEVnQBG/RACalGUbw2CS7DD:mBLYtOvLGazZ6wAnQWRRUbw2CqD

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Users\Admin\AppData\Local\Temp\denis.exe
      "C:\Users\Admin\AppData\Local\Temp\denis.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GO42234Z\1305UKdw[1].htm

    Filesize

    278B

    MD5

    9fa1cef991fe6e8541a0c8fb5aa3a5b9

    SHA1

    59851a273d54ea0d43eccd328cfa594e14f7a352

    SHA256

    98fce9f1f8d8acce3e1c12cd42d8466d57b54ce3d78160229a0f58d7091bbbfa

    SHA512

    a007ef97dd8fcf2b09ceca0f56948e06fa53f86833436d5b1915dd9b622d797fd1b1a65f33ea9c46931cbda1b921ace8b66ac5713beded0c4ef56e279eb35134

  • C:\Users\Admin\AppData\Local\Temp\denis.exe

    Filesize

    5KB

    MD5

    3ac25346f745e7ed4bddc34fc259366b

    SHA1

    d68ddea5a81f6d83c888b4bcd45579537e7809f3

    SHA256

    68af0cfc65d76a653a87d114a6a778dde5172547214f3455db3cb959f9f02e48

    SHA512

    b4718766c10da6bce4c9942d6899e8a229ee0f5ed3672079ac608b543da6b7f7dcd67dc96bbdadc841e4145a7aec8eeceed45fb89cbfdbd641b8238cc00657fe