Analysis

  • max time kernel
    120s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 23:51

General

  • Target

    bdebddd9d1304655d271e44a0f66e0c0N.exe

  • Size

    390KB

  • MD5

    bdebddd9d1304655d271e44a0f66e0c0

  • SHA1

    36c7d89b3935a8c71c83cd1ccdd0fa562096b837

  • SHA256

    b982f874cace61378e09dc290f18ef1f0796103516a1b3d8ea7017a95a8f0588

  • SHA512

    a494e0a260bf98b10b6e6ee1a7fd36e91ee986d36b2301467671bbd5c548caf7cadddfd11ff928e66e74b3bd4d91fb292dfcd61414efa77a68ea8f81019c6558

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXRZ:nnOflT/ZFIjBz3xjTxynGUOUhXRZ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdebddd9d1304655d271e44a0f66e0c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bdebddd9d1304655d271e44a0f66e0c0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2364

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          390KB

          MD5

          f25df2719caab3dbe5889ee8ae2baf40

          SHA1

          1dffe51643a014abb69722e4aecbdfd537e36129

          SHA256

          13d199c56a31b4047a15d31cd01aa44c5208a6572c70cb13008a0ec1ed4e57f2

          SHA512

          e37acf6d4f2bc02a6815f3f6c24078af52f599595f713e1ad769f9b8f460d334a2f10ab919de3ffe76760f4cb309486a558ceeee08307309d62dc5b8b0cb1abd

        • memory/2364-23-0x0000000002D60000-0x0000000002D66000-memory.dmp

          Filesize

          24KB

        • memory/2364-17-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB

        • memory/3212-0-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/3212-1-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/3212-2-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB