Analysis
-
max time kernel
149s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe
Resource
win10v2004-20240426-en
General
-
Target
360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe
-
Size
41KB
-
MD5
07bf1f64ce40085c19bbf142ea29a940
-
SHA1
5f6d97c70aecb31ad1a9a66e61deff18866a9657
-
SHA256
360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5
-
SHA512
f7cc9a373f9db3c9c1d9d8d839dd9da05d80ca7f92bd48dbe5b037a950806568a9199612ba5ddaafd6f49ae13181247ec10a605a0f5eabac25bec07e4da590ff
-
SSDEEP
768:Hg2LQe7cIcQths3KTD4r98DT4IdVVI9P9:Hg2x7HtheQQ9C4Qe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe -
Executes dropped EXE 1 IoCs
Processes:
dcare.exepid process 2152 dcare.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exedescription pid process target process PID 4840 wrote to memory of 2152 4840 360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe dcare.exe PID 4840 wrote to memory of 2152 4840 360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe dcare.exe PID 4840 wrote to memory of 2152 4840 360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe dcare.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe"C:\Users\Admin\AppData\Local\Temp\360d34a09b2e40c5acba611cfb91f723bc8b16cec0af1b4b1b0618d0e8d619c5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\dcare.exe"C:\Users\Admin\AppData\Local\Temp\dcare.exe"2⤵
- Executes dropped EXE
PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD531d24d69ade29a9f00a02eb7cbf39e3f
SHA137c1f736e5c00c20ae0f61f2cceb35c36983859f
SHA256f292306a6e2abbdb41814825e4d115f5c0eeb2cdc8c431a1efbbb91f3450212f
SHA512433cd9f59d9c475d0a8b942f324f2c2dac264419027205a959ca8d3a81cef992d467341c3cbe86b5de37d22a38ec0bcc7a421984e5ee006824cdfcc6983031b4