Analysis

  • max time kernel
    113s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 11:29

General

  • Target

    7a00a65b9bc3ef2ac4ad3733b2479fd0N.exe

  • Size

    5KB

  • MD5

    7a00a65b9bc3ef2ac4ad3733b2479fd0

  • SHA1

    6604a90017ae96b5a8a24e91f5a82ab40ac54585

  • SHA256

    8e134c44c8708784137b6fcd4897101e54359cf9ba87fa4781c11e6772ffdfc7

  • SHA512

    9ec37972a69256abd09aef7eb32da05a3d80eecccfa5c88c7acef4387256652dc7fca7f998b568f8aac76b3e73b966deb7531b71a285543731eb4a065172ceff

  • SSDEEP

    96:/EGp1qQRQmgGhlfZT8kYlXsBIArL4zNt:/tmoQmfhf8kYJsyYa

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a00a65b9bc3ef2ac4ad3733b2479fd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7a00a65b9bc3ef2ac4ad3733b2479fd0N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ImECbX8D.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\system32\timeout.exe
        timeout /t 3
        3⤵
        • Delays execution with timeout.exe
        PID:2288
      • C:\Windows\explorer.exe
        explorer /select,""C:\Users\Admin\Desktop\viso_mdm.zip"
        3⤵
          PID:2740
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ImECbX8D.bat

      Filesize

      230B

      MD5

      9e1508066c979dd24566d5b203afb04d

      SHA1

      2eb6f0a47bb0432126c90f5b9519241e23f9206e

      SHA256

      78b4bf63fbca504d482739dbbb397e93889e4682751197655d48e2b5863ad0d5

      SHA512

      1fac2c64934a096e1a3365bd046138eccda151ba4c9064d1c0e456af71df0c3f3d7231b35f03b5300cfc2f5185c2ef438c5290372fe1b05a65225ca20d311e98

    • memory/3144-8-0x0000000002F50000-0x00000000030FE000-memory.dmp

      Filesize

      1.7MB

    • memory/3144-20-0x0000000002F50000-0x00000000030FE000-memory.dmp

      Filesize

      1.7MB

    • memory/4508-1-0x00007FFA7B6A3000-0x00007FFA7B6A5000-memory.dmp

      Filesize

      8KB

    • memory/4508-0-0x0000000000350000-0x0000000000358000-memory.dmp

      Filesize

      32KB