Analysis

  • max time kernel
    144s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 23:49

General

  • Target

    7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43.exe

  • Size

    1.6MB

  • MD5

    0c01ebd6bbe5c658eccc2e88c614d292

  • SHA1

    1bb749adc70460e5c8374725fb0f88b99fc07f83

  • SHA256

    7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43

  • SHA512

    4a5ef9daaa2a7bd8463a192ec125b70acb87b8558a0e0c4cf5ab8419a6cd70669f39411bb29c3ab5f7c782d2e99ef2b1cc7a8654fbbd6a47788197e18a4a1d64

  • SSDEEP

    49152:198E8u/Q9wvsvhCcD0Tgy0LXu1qoTzmYvr6/T:19PVkwvsvkcD+v49pN/

Score
9/10

Malware Config

Signatures

  • Detects executables built or packed with MPress PE compressor 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43.exe
    "C:\Users\Admin\AppData\Local\Temp\7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\416E.tmp
      "C:\Users\Admin\AppData\Local\Temp\416E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43.exe ED917C8641D21F5A858CC1F9EA730E06ADFF7E820D78D2742480394EFCC3002E6C1E33E47070FC8053227720E34F089BD362EA15F1692841FE26957DC92110CF
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Users\Admin\AppData\Local\Temp\7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43.exe
        "C:\Users\Admin\AppData\Local\Temp\7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:3404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\416E.tmp

          Filesize

          1.6MB

          MD5

          8ca508983e46d3ed2dd8729983d61c72

          SHA1

          998610a8fc418bc567b2f52df5ccde8d95cb71a0

          SHA256

          bbb11c8803ba6ec067abab3e65a6d3c5ea51eb65cf79ec0ba3e0e15108af4626

          SHA512

          aed775a49428c8772c4924159bcdf327f0f4baef79b556000fe43536cdf417230a6d85186051c05c07f3bda005b3a11a24f5f2f786a94d5f7de64a05ee0a105f

        • C:\Users\Admin\AppData\Local\Temp\7c90bcbf5d4f99f2f38cf307d241c085313d072d66621685ebe9ef7e67d66b43.exe

          Filesize

          1.0MB

          MD5

          03b18ee5ae548b01cf455ca56aa2daae

          SHA1

          3149878b9d40624265bd1abd63632ec21bf36c8d

          SHA256

          9f581b5730b3f10de2a3b3a21d3e476f3094feef3e4dd92ffdaa103f6c410802

          SHA512

          919b9e512a30c643052337e461fa1fbd055932b4a557753fe03ebab29925bfc6d1aba61a92f320729569a5ad3d60e7493b43e366313f5328caf0597772f60721

        • memory/3404-15-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB

        • memory/3404-17-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB

        • memory/3404-34-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB