Analysis

  • max time kernel
    101s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-08-2024 23:02

General

  • Target

    8a07e1ba700ac0f7e389bfa482131ca0N.exe

  • Size

    94KB

  • MD5

    8a07e1ba700ac0f7e389bfa482131ca0

  • SHA1

    7791aaaed3ffb803216204efb9ecea63cf090083

  • SHA256

    02e7591cb9be1ef8a5cefb29d497eff25034ba3fbd18afd7f7aecb194f3df577

  • SHA512

    c296f5a96bfdadc74efe573e4315500d95e79280b1c50c99f9b162c4fbc0805361a922495477668d10b5fefdd72ea7cc1492e5f2f14cc8182bf923d05fa61f17

  • SSDEEP

    1536:PGYU/W2/HG6QMauSV3ixJHABLrmhH7i9CO+WHg7zRZICrWaGZh7ub:PfU/WF6QMauSuiWNi9CO+WARJrWNZE

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a07e1ba700ac0f7e389bfa482131ca0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8a07e1ba700ac0f7e389bfa482131ca0N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2388
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\8a07e1ba700ac0f7e389bfa482131ca0N.exe" >> NUL
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\wuauclt.exe

    Filesize

    94KB

    MD5

    5c33ec6859e794096ca7c2fdc1606e28

    SHA1

    fda9e5f7a19d8b90989ef62ec188f8b89501326e

    SHA256

    734a28bcaabb2d5c88c0ed32ac864b3e6d4962349586d05b6432751d6c5178ee

    SHA512

    faca0e1836a43fdcd9679270ae09a15db8b6bbfcc8617718a28c0a58e2ea33978bc8d6d2d1bfa1b454d6376d596c7f8cd607c1d7bb4d81a96bdefce1528e9297