Analysis

  • max time kernel
    119s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 02:49

General

  • Target

    533966f4f2fc56d3b019d71a8aca88c0N.exe

  • Size

    51KB

  • MD5

    533966f4f2fc56d3b019d71a8aca88c0

  • SHA1

    2210b216c1cea895740a64942f2003b0ae80d60c

  • SHA256

    32eb7c89de5e637542cd86b878c494014fc4961ef749c7831acccd7ba2102552

  • SHA512

    ea8ecbf3ae4ade899932177e25174d250d4819314b1af941dd75a551ae38fecd1f8e7855a5212dcd84ca28f5cb43434c8d53d6cb687d882e8f6078567913476d

  • SSDEEP

    384:EqXJhMCEfgNfxAwMRGnkXF2MTNeUGpPdMYbsd/PwIsyUbSZBAPn+zNY8yrva92zg:EsJhM/44Ak12M5ezNG/2rb7+ZY/vAeM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\533966f4f2fc56d3b019d71a8aca88c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\533966f4f2fc56d3b019d71a8aca88c0N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Users\Admin\AppData\Local\Temp\wujek.exe
      "C:\Users\Admin\AppData\Local\Temp\wujek.exe"
      2⤵
      • Executes dropped EXE
      PID:5116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\wujek.exe

          Filesize

          52KB

          MD5

          96383c8dd792a9df1cd8a1bf7e5bb4e1

          SHA1

          820f2e703327e4e23bbac0ba982f2da62870fc7f

          SHA256

          847ff31a837b2335dcc0fa3595bf9c60d09661daa98252d1c2bfa263ee3c8322

          SHA512

          c31e954637897943efdf4b1977136218f8f52e7ef10e3502c2c9574c49fa4ae93db1d9d07dd44e97c52ac8e9996d491a7376211cf2be2ba09bc445b510279517

        • memory/4644-0-0x0000000000403000-0x0000000000404000-memory.dmp

          Filesize

          4KB

        • memory/5116-9-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB