Analysis

  • max time kernel
    127s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 20:33

General

  • Target

    330aaefb49f90008721cf85fe2954424f97472c9e4d3b252ccdc7fb667e2b141.exe

  • Size

    33KB

  • MD5

    cb952955696041a8f4761173a6e045a8

  • SHA1

    2dbbc9717bcca9ddc000617cf65df3c8f1fefbe9

  • SHA256

    330aaefb49f90008721cf85fe2954424f97472c9e4d3b252ccdc7fb667e2b141

  • SHA512

    3e65e87b30d423fee1cb9630835bcc6ab84c1d493efb4c4701ba2663a8fc5f7220ab12f206e6d79ed527caed6f9871414d69ff17b4d84b96cba51ec51f237a94

  • SSDEEP

    384:IP1rSObxPFpopxBoyAI47lUb0LE9QhsgNQ9r4TTFnqoMLHXt1:IPJDtPgrlYLESsqysTTFnOP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\330aaefb49f90008721cf85fe2954424f97472c9e4d3b252ccdc7fb667e2b141.exe
    "C:\Users\Admin\AppData\Local\Temp\330aaefb49f90008721cf85fe2954424f97472c9e4d3b252ccdc7fb667e2b141.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe"
      2⤵
      • Executes dropped EXE
      PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe

    Filesize

    33KB

    MD5

    febb0ea0f9fb1f962bad39cf6484e2a0

    SHA1

    51a7c9a50dbab5373fc5c6cc5bae157413a5b52f

    SHA256

    f393c6a092d866fed05b840d59ec31cb88f071f16aafc338db841ab101ac41b3

    SHA512

    eda7b2122ed211d9d5ba4e7b76a7d3850cad2257b6ba0f058d9165ca9b392f8372abb45e98607f23054d07a6ffa0f993fa02716d645c62cb0d7d26d9a359f2e3

  • memory/1528-11-0x0000000000600000-0x0000000000607000-memory.dmp

    Filesize

    28KB

  • memory/2696-0-0x0000000000600000-0x0000000000607000-memory.dmp

    Filesize

    28KB

  • memory/2696-2-0x0000000000601000-0x0000000000602000-memory.dmp

    Filesize

    4KB

  • memory/2696-10-0x0000000000600000-0x0000000000607000-memory.dmp

    Filesize

    28KB