Analysis

  • max time kernel
    114s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 00:49

General

  • Target

    373517bebb2f0a306ad5a69851353020N.exe

  • Size

    57KB

  • MD5

    373517bebb2f0a306ad5a69851353020

  • SHA1

    418aeed3cde2a07fd846361fa739a623dfc3e9fe

  • SHA256

    753fb538b8c1a9182a54e78825d5b5d025312d59fe7e7d82230b1496283f0916

  • SHA512

    e8280a1087934a73e8f0178c3a7c1073cd2ae306cb16674c778680db6cbd921e9410a4c74a7baadcbb5304c6063824b3311909a55797450602269ddc210c0c48

  • SSDEEP

    384:PsjPGY2HXgrk8YhQ98E8I1XAV/QcaYpATUgch1A9NB/erxlRufmm:PePG5H8+hKD8ISZQjkgs1lxlRAmm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\373517bebb2f0a306ad5a69851353020N.exe
    "C:\Users\Admin\AppData\Local\Temp\373517bebb2f0a306ad5a69851353020N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\winupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\winupdate.exe"
      2⤵
      • Executes dropped EXE
      PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winupdate.exe

    Filesize

    57KB

    MD5

    84a6dace514e9a6c51b9bbec8f349295

    SHA1

    ebf9cbd7f951652eac82bcdb41eefda3f688db9b

    SHA256

    592f86107538a5b039c6d2a64b88fb3e6ae7f76a8acb64af4fd3f3181554bf37

    SHA512

    33053d1052104880b8a742078889db19b0f46976aa08a14bf16c3a78a15cce92397fc5a00b2339bcab66593a6a6a0f30041f3e5ad36b29d3fe63089d097f13c6

  • memory/1676-11-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/2576-0-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/2576-1-0x0000000000501000-0x0000000000502000-memory.dmp

    Filesize

    4KB

  • memory/2576-10-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB