Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:53

General

  • Target

    db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe

  • Size

    588KB

  • MD5

    a2c36ad07f9becaae9a7bbf740e1bbf4

  • SHA1

    50aee7b0bb29a42b8892435b1e8b862b56ce48e4

  • SHA256

    db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f

  • SHA512

    2dbbeab604e41e1562f5563f4e5a6e5d266fd9c62d2b3741a6d7743d47ae921622d1efd56999c0791a9a6300a6ecc2889c656c4670c4708581ab6830e5c71dba

  • SSDEEP

    6144:LSQv+4RgcbXRnUS+qvxBYKf5y8RUsOmvfO6/WuCyKxjoatEhg40uQRe+r:LS/4Rg2hun8RDXHWuCrNoU80uQRjr

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe
    "C:\Users\Admin\AppData\Local\Temp\db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\temp\GetPart.bat
      2⤵
        PID:4712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\temp\GetPart.bat

      Filesize

      98B

      MD5

      2d1f89869dc8657ffd579dee66f4b40b

      SHA1

      c190ae3ea592b3e6307a8dc5b5c1182417fd640a

      SHA256

      f724a5a958d36092a1dd2e8684edeb6da6ff82b99eeb4c32499f3b62649ccea8

      SHA512

      ac3d1a098965160d52e615a7b87788c41ade851e941ad71c105a1c1f2246106a9c18b71b5a790a3d8a7815113ff072e1187ed05db55fd1d346fc5a022961be02