Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 02:16

General

  • Target

    b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe

  • Size

    35KB

  • MD5

    73087bb93ac07f158534aa3a7335fe35

  • SHA1

    e799f4899feaae339764115f33b30a52a83e4462

  • SHA256

    b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e

  • SHA512

    c4cc0ca9e6848786caa8724663324c21bcff1af9615acae60d980173ca939516942137f4b76970ad5684479b31d337fe2a211cbf7050515dba16598300bc7348

  • SSDEEP

    768:N+/5kqPgZWZwOmso3OQ9fkeVMZjuNz1ZnTgmgJTw10PP+7:Gi8SWZwORZpduTZvWPPA

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe
    "C:\Users\Admin\AppData\Local\Temp\b7c75b1a0d8afb58187aa58db7ca1f33c59ab10165ed59a486dbaa626670335e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\kyyjs.exe
      "C:\Users\Admin\AppData\Local\Temp\kyyjs.exe"
      2⤵
      • Executes dropped EXE
      PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kyyjs.exe

    Filesize

    35KB

    MD5

    a3f15ea9706d107d8adec698b1d7728e

    SHA1

    2d513989791fa667b34a3229696d31f005069166

    SHA256

    d41836bf9e36d8d0f2b84391f2dff249a993571c869d1d91b2d940b5b51e5a4d

    SHA512

    a7fc3b73b1c8356d21b871b33b15c3579b0c4be652ac0a273ac91c00904333be4bc71230bb6d6bcecb66608a86903f5bc573bd5bb2da76024fa856e9d2c33c6e

  • memory/976-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/976-1-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/976-14-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/5036-13-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/5036-15-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB