Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 02:38

General

  • Target

    25b261e77045c54f240187de781abd90N.exe

  • Size

    44KB

  • MD5

    25b261e77045c54f240187de781abd90

  • SHA1

    f2c15364925b36eb9cf075ea9dbfe223e882924a

  • SHA256

    68e9b46c151feff2e12a9c24374c866fa0f5157a992b9c90499a0c8d70566ac4

  • SHA512

    8df81748fa5d0647f84350ebcd22c5af357b8eb1ccb0f5c45f85ee039fcfd0ab048bf2683f264ac765f9f6da73bcb20987c4e48b2b6ba8b515a44659e3642412

  • SSDEEP

    768:0KntXyDOo26TDhCU/xLQBZnK5Z7J+5s0x+Odt:pe26/hpO/0ssghdt

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25b261e77045c54f240187de781abd90N.exe
    "C:\Users\Admin\AppData\Local\Temp\25b261e77045c54f240187de781abd90N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Local\Temp\saloon.exe
      "C:\Users\Admin\AppData\Local\Temp\saloon.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2120
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:8
    1⤵
      PID:908

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\agdsly.exe

            Filesize

            20KB

            MD5

            a78f881227ff5566c46380fc9aac5339

            SHA1

            6caf1084abe44bb8cb653b815221e9b9d49a1aec

            SHA256

            8297f96d560fb756efd55e1c6f0a5cf17b4f8cf745ab378782c62220098f18e8

            SHA512

            f98b4947aba45643d8cd1c777c84c48a6935c6caad6309da87e9a395399d5d9308873150470cbc1e7602d2f413f2d6b27ba57ec447f674feda27e53d2ec1f261

          • C:\Users\Admin\AppData\Local\Temp\saloon.exe

            Filesize

            44KB

            MD5

            a6bd592b164b593a569bb3380f551cdc

            SHA1

            898c40fdf800e041cf08b678fa7b65aa48f63d92

            SHA256

            ec208ce25f95418452db198ca71ffe2d335511a38d9d6164b2a750b7bd6b88e6

            SHA512

            afb6a016a281f5c67be5e8a98fbbbe9cb377391522b170d929e761c67b52c6f15b81119395e917f3baff853b848ccb4f00d00ca1c5b2fbd790b1cdbc2cba2218

          • memory/568-0-0x0000000000401000-0x0000000000402000-memory.dmp

            Filesize

            4KB

          • memory/2120-9-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB