Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 19:20

General

  • Target

    2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe

  • Size

    50KB

  • MD5

    6f3334d809c5ddc67265e9d12f2ba795

  • SHA1

    2e18336b2425afb6807d314afc19d81d4c1257eb

  • SHA256

    2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da

  • SHA512

    dbedbd63511685563b1a585d61280b76e5a6f5302ad38633c005c783355df47527741e4d341f0d84c0485e54538b2d50c65f8e6c6295311178038f1d10133648

  • SSDEEP

    384:EqXJhMCEfgNfxAwMRGnkXF2MTNeUGpPdMYbsd/PwIsyUbSZBAPn2+qvX97yozJ:EsJhM/44Ak12M5ezNG/2rb7vqV7Nd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe
    "C:\Users\Admin\AppData\Local\Temp\2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\wujek.exe
      "C:\Users\Admin\AppData\Local\Temp\wujek.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1692

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\wujek.exe

          Filesize

          50KB

          MD5

          a1b40ba55df4c406c868bcfb9fa2796d

          SHA1

          02670e06de5b3b344bcc1a6495ab353eb53d5578

          SHA256

          1e6e996988d45a5ab7ae2564cbaea9800ffbc6f37871bd247ca74c0ea9162711

          SHA512

          e11eef68ad0a22e74ffb365afedc6df3a6d2a652d62ec817c5dae3487a1643b9dd939a0e17ca241e1a15bd8bbe71f1588fda21e268812c6f5105673a6a262980

        • memory/1692-9-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/2232-0-0x0000000000403000-0x0000000000404000-memory.dmp

          Filesize

          4KB