Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 21:04

General

  • Target

    4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe

  • Size

    5.5MB

  • MD5

    0c6ec40e822d786d0b266fa0f90bd6f5

  • SHA1

    56be16b60f8e8608cb7304a6b6b690d9ab7137f5

  • SHA256

    4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6

  • SHA512

    159acd9e1213cfb0ce3c80a69e83becb834f1a61b9b968f103d2f874e89a159a0bdf1f14801eb3dfb31c419cbf9d2d73426ab29907d8217bde65d283c53372f4

  • SSDEEP

    98304:A0SPgW5G6uUIQBbrXyHA2r25KOKLT1k6JqHS/RY0drKCX8vF9fNS:tW+kiHpr2ILJk6JMMRj+d9S

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe
    "C:\Users\Admin\AppData\Local\Temp\4ce14a5b44998e27766c013f7d1bcd9e41ac9f1210301745f10297bc7390c1a6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\hots.exe
      "C:\Users\Admin\AppData\Local\Temp\hots.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hots.exe

    Filesize

    5.5MB

    MD5

    09e1eb361ea43d9af6134bd70dad526d

    SHA1

    81d9c9bde14df46c68dbb08bdf89d69f09150e05

    SHA256

    0e776fc774edd3f89c4102e8f2b7b59daf76c827738aa721f459169b58aad813

    SHA512

    5b9caa2d9ac5df7d80b027fa17d8cb1fde5e7bc255310e7b8eb93ef3ddbcfebeb3d43d5a211deeb8004b11b3cb37972354816c9b63860480b3184fbf866a3ab0

  • memory/1148-13-0x0000000000400000-0x0000000000C7C000-memory.dmp

    Filesize

    8.5MB

  • memory/1148-15-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB

  • memory/1148-17-0x0000000000400000-0x0000000000C7C000-memory.dmp

    Filesize

    8.5MB

  • memory/2296-0-0x0000000000400000-0x0000000000C7C000-memory.dmp

    Filesize

    8.5MB

  • memory/2296-3-0x0000000000406000-0x0000000000701000-memory.dmp

    Filesize

    3.0MB

  • memory/2296-2-0x0000000000400000-0x0000000000C7C000-memory.dmp

    Filesize

    8.5MB

  • memory/2296-1-0x0000000000E00000-0x0000000000E01000-memory.dmp

    Filesize

    4KB

  • memory/2296-12-0x0000000000400000-0x0000000000C7C000-memory.dmp

    Filesize

    8.5MB

  • memory/2296-14-0x0000000000406000-0x0000000000701000-memory.dmp

    Filesize

    3.0MB