Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 19:54

General

  • Target

    2d49e796f0bd5c1360ffa3c273ec0d012ae92fb70a5cdec665b57be6a9036dad.exe

  • Size

    38KB

  • MD5

    cb593a6815411d89bad8872681d6bd22

  • SHA1

    52a60621005e52fbbdd1c61d4aee0fddd4355a13

  • SHA256

    2d49e796f0bd5c1360ffa3c273ec0d012ae92fb70a5cdec665b57be6a9036dad

  • SHA512

    fe77a1c25058a24a1bfb83e49e9184627ddf8a6369dbb8c748f15c9b4f62bf8fe18c2d4e9f57cb0381c335241b476f8dc0895225e5de20867013d12d408d3b41

  • SSDEEP

    384:7ccfYpTlWMhO7tQFKNtiwfjmrgaMXAuRmXMSTiGEU7kJ5MFlJGQEsDu6if:7cPJdqNiwfKrgXAfTibMRli

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d49e796f0bd5c1360ffa3c273ec0d012ae92fb70a5cdec665b57be6a9036dad.exe
    "C:\Users\Admin\AppData\Local\Temp\2d49e796f0bd5c1360ffa3c273ec0d012ae92fb70a5cdec665b57be6a9036dad.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\aiapdf.exe
      "C:\Users\Admin\AppData\Local\Temp\aiapdf.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:808

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\aiapdf.exe

          Filesize

          38KB

          MD5

          8b5718713f86baf762fbc48f8e67f19c

          SHA1

          631dcf6caf78339ae31fef1a59afc4b8add8ed34

          SHA256

          68fdb7ddc66348e6e22711fc87f8f914666e82063ca4fe26af744a013641d0fa

          SHA512

          433bb07dc0062b7bd498b0237d37127d7de8e471599bd7f98f6e0a3e413a7f67f53ca9d65698600391b6038baec1c3fb2407f02694ca453e5f8b9b9f3c1731a6

        • memory/860-0-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/860-1-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/860-3-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB