Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2024 07:42

General

  • Target

    8b539a06f73be7631c06097dd2537e00N.exe

  • Size

    154KB

  • MD5

    8b539a06f73be7631c06097dd2537e00

  • SHA1

    465f3410bf356c5d1cacc35137722a2096e2a4a3

  • SHA256

    6edf4b4fd4c9444373d4cc6a9d1022a174c7088361c7212d5e7877eb030d150c

  • SHA512

    9223f280ef96221a827bad46c882d2c64db08aed65c1c8426988948119cba803730f7936548768c7d030e3579f04057a6e2a7a319b24e2967d3a6d28b3c901c8

  • SSDEEP

    3072:Ntbqvi9nMKxQbZ5x66EfACsxfcYvQd2Oew:Nt2vsx+AV4LfLOD

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b539a06f73be7631c06097dd2537e00N.exe
    "C:\Users\Admin\AppData\Local\Temp\8b539a06f73be7631c06097dd2537e00N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3268
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    154KB

    MD5

    168eb6fbac21f9ee4c6c8bdffb92b0c9

    SHA1

    a8ae033932a7e85d4921e01345796dc1eb441fa7

    SHA256

    3a76d440cb8a2e4ac952ce3c38016bb74d5d4cdbf06e4bb5ef70ff1267839ca6

    SHA512

    c20ad48fa8bbd8043126c6580e34cdfd7cf5948c969de1debd101b7ab73d33d6605d611ef83989f3791ad4d4f339c6b5675c1f530feca6b8f83063df76cb62bc

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    2930c042c9ee5e07f321f2134a0c7edc

    SHA1

    ee39f41eaf6ce3c8d917a89e65959414ae0088e6

    SHA256

    a328475bbb730da292b83ed6cabbdbfc0616f042296f0c6fa356c5368ffc1309

    SHA512

    2da91d5effc116d8c8661c2a99f1d9c2aaffda0f776551dc7ad1911fdb2765591e5b441b9a1fe0090bcda8ed24d180b563ed2c127676cf1de40001e4b15b5506

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    276B

    MD5

    31429775ef6629e8cfb9db58991f6b72

    SHA1

    ab996535ed2155db6bb71fe93aa58f2b97517117

    SHA256

    44e501989e3e5bd3c85d7fd4dad7cb4c5f2110bf1986084b1251124ad03884f7

    SHA512

    8174bbbee728ac71f41b6a1fc24b9ad53b4444f5ca64652672d35a14e80f1bc0c8ea3c8ee64385d1c76063a11a4a53c8acdbbcf9b82abe4a155cce68556f16c7