Analysis

  • max time kernel
    120s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 07:37

General

  • Target

    a934df4f5b2760aec8fd9a830f04ca40N.exe

  • Size

    51KB

  • MD5

    a934df4f5b2760aec8fd9a830f04ca40

  • SHA1

    59cacd924ee694d146cf0bd62ea08e5109f5c1ec

  • SHA256

    15368f5d2fdbd1324643ca21de570827aa27a9c730d27a74a5fe1dae29e90180

  • SHA512

    2a39e38744eade51477c96fb16ec959b3185bd0d8655dbf150c188fc657bc3933b6f34c9169f374d2703f4e0f0bf4cb5f7540cdf36b0fc7742a4a665b2d3ccf6

  • SSDEEP

    768:exwhM/tqZKgVuz1NmnbcuyD7Uf54Ak12M5ezNG/2rb7vqV7Nd:exkAGnVE1Nmnouy8B4ZUGezN/jqVRd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a934df4f5b2760aec8fd9a830f04ca40N.exe
    "C:\Users\Admin\AppData\Local\Temp\a934df4f5b2760aec8fd9a830f04ca40N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Users\Admin\AppData\Local\Temp\wujek.exe
      "C:\Users\Admin\AppData\Local\Temp\wujek.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wujek.exe

    Filesize

    52KB

    MD5

    cf09764c83bc6f044aa34f9cdecd5372

    SHA1

    714a7cc15996388e788ef07cf0b73972b97d09ef

    SHA256

    e52f81d99e14b399a684d3b96e7f1a955e58f74c0b944af598ae900d13caa9c1

    SHA512

    c674359fedb77fd514e5d1afb5dc891f2b5320afd43e1635abee4406484e232da928b21d67bbdef5cdde5324cbe8449780b041760d5a4b60fee2ce70c269d58b

  • memory/208-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/208-1-0x0000000000403000-0x0000000000404000-memory.dmp

    Filesize

    4KB

  • memory/208-12-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3188-10-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3188-11-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB