Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 18:50

General

  • Target

    0f6cb594f743900c9b61abdf16a7e9a77d93792742231eb84bdc7cdaa5afde90.exe

  • Size

    42KB

  • MD5

    604f27b8b4ebe29101902e15a53cc918

  • SHA1

    1c6697bf9fd9c2e4276301c68a0f6bfafe6fb051

  • SHA256

    0f6cb594f743900c9b61abdf16a7e9a77d93792742231eb84bdc7cdaa5afde90

  • SHA512

    6af3c71dcd42ab3ebeee11927c28e97bf9f4bab7807335ea5853d70d0a552d04b865d005718b5471e335e583d33100d9ecc6ff80074ecc886eef8283a34e6072

  • SSDEEP

    768:m8eRH+9lFh0ul16sh7iQroCHXf+RjFBSuB2XdT1Bz:m9l+Z16sh7iQroCWRB0uaTv

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f6cb594f743900c9b61abdf16a7e9a77d93792742231eb84bdc7cdaa5afde90.exe
    "C:\Users\Admin\AppData\Local\Temp\0f6cb594f743900c9b61abdf16a7e9a77d93792742231eb84bdc7cdaa5afde90.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      PID:4272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe

    Filesize

    42KB

    MD5

    ef6d3e9b8222c5f683b8ea2369713960

    SHA1

    4d48b427e64705ddae8c489c74636a30259f7ce3

    SHA256

    2b179bba98f328e8f48e89c8ce4be588c1d6c43a2a5310f7964f2f202b417c11

    SHA512

    9e2086775dbb2d2552c241a25bad282566cdf342a6438e949ac93ddf82c243dc24c344878516c6b234852f577517e28b36683cd0a9828fbd74888c36cddfc49d

  • memory/1332-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1332-1-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/1332-2-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/1332-13-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4272-14-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB