Analysis

  • max time kernel
    112s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 20:57

General

  • Target

    0b4553c3275e420f27b363e949f06ed0N.exe

  • Size

    28KB

  • MD5

    0b4553c3275e420f27b363e949f06ed0

  • SHA1

    10cba3017ff4ebc18d1820ce10c0855aee6547d0

  • SHA256

    101f5a3f0c19a5c0bf9f94eb18b8c1f08faccc3aebb0f26802472bd4132d6a86

  • SHA512

    19172d678c18b6aa2f8543e52d096a36ac3e19db8392a950b29b5fce9a96335fcd8ae8456a9b7a50834d4a289faf746e7381f014b3c14573ac0ddca79f3e8c12

  • SSDEEP

    384:gxBM3bV0V/N4NidEepdEurPDdhClkzLDw2uzibjV3gYXo4m4m4m4GCyzZ5k:g80Ve2Zr+l0u0jmY44m4m4m4PUE

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b4553c3275e420f27b363e949f06ed0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0b4553c3275e420f27b363e949f06ed0N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\lasma.exe
      "C:\Users\Admin\AppData\Local\Temp\lasma.exe"
      2⤵
      • Executes dropped EXE
      PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lasma.exe

    Filesize

    28KB

    MD5

    f89fb7520d3df4b3a348996610d15b0a

    SHA1

    e9cd794fddf2af5b68b9b76d182f7a55965c5cda

    SHA256

    945c32443483502acd9ad904d29fe135eda355739e71bb6e51e9054a133cc984

    SHA512

    c6a6dfcd8b8486e9bfdad7172cbef8abc8dfb98f08adeeb3550155ee2738d3b567b81a03b7e0c79b27a1e662833c3ea029a1528261de2cb56d8ad5bc159bc7a2

  • memory/4092-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB