Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 21:59

General

  • Target

    8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe

  • Size

    4.8MB

  • MD5

    ac00a9a9fead5378f8072ac3350571a7

  • SHA1

    5cca77c5ce97e4bcbf384208d7bd079972fe4740

  • SHA256

    8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625

  • SHA512

    38ac35cfd98ffb56010167cb9f3f885b2f431d7c7da07c513e75ebacb8dfbf17c73578fb1e9d939e45634cd51adc09aeaf82813abfba2ae7d266ff437d092d66

  • SSDEEP

    98304:utiuhXuhmF1OgPptZDElaxQ3PCTDsRnLPYSz7Iy:QkktIa6n3Iy

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe
    "C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe
      "C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe"
      2⤵
      • Executes dropped EXE
      PID:2704
    • C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe
      "C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe" 3200
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe

    Filesize

    370KB

    MD5

    6e3b18cac5d61c109906e94ce895d2bc

    SHA1

    557d63dd72dc47e9b2d701c40e80fba1e108e9c5

    SHA256

    db70869cfafb8877fd02beb9d970427e6103c1003d04eca2dad1ac9a9587d489

    SHA512

    e27d2cf4e63b414b7a8e89c48e9b4c0ccb93e52c2405e9b5bbac13352daa3cf9e619b48845547ebdbfaa7ef8af850f1c3fe4b8ac228dfa3d14095d86cf82340b

  • C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\TestSecurity.12.7.0.249.dll

    Filesize

    1.6MB

    MD5

    a7d19e10c06f0b71f69c15e0c070f66a

    SHA1

    11a10b61e3925125b963e3074dea63f36084da23

    SHA256

    6b766ffee9ee5ebeee3830a90870afca99a79e7611fd81f2e4afab009513a3dc

    SHA512

    09cc5eff3529881d540ac96cf5fe488dc843d131d7c4527b2dbc4349c048a1cd2d1f190365f174d5972624805d07b84d513aa274144bd2974ced2ec57e2ed758

  • C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\spinner.gif

    Filesize

    14KB

    MD5

    a98a798d1bb6ad80560e4811d07ffbb5

    SHA1

    4e985d0366fa06beb628f1620edf32d592312e90

    SHA256

    dafcf9bbf9dcbd6ef0c3281a9cf739e115ef8934e6d711ca130a4d4eed19fb6e

    SHA512

    a0a00c29f5fedf21bad7e49f3016353ce19e9a6501bc31d9cdc22e517504b2bbf43f86def6a5815276cbd4c213414a86bb0ea96ecbc1c6249d67b6de90e5798f