Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 13:56

General

  • Target

    4fd7f137b11f98d74d9d400f9c7abe2a7bb626ce42f733df2928e1bdf86a8c7cN.exe

  • Size

    40KB

  • MD5

    39efc04d64e20f21df5be7222697b250

  • SHA1

    7d209026eab534187213b22333d33c60a3c42c0b

  • SHA256

    4fd7f137b11f98d74d9d400f9c7abe2a7bb626ce42f733df2928e1bdf86a8c7c

  • SHA512

    247c0f1c904257cb665f36222aa6e3f14e0a3c76c46871127da29690d947f4b1a75e547737f415f5fdab3a5ca81eda57bde96e9e8ae950819d6051b4ccc7dc4c

  • SSDEEP

    768:T4j7YBkweh63h7iQroC8XtgZnRl2zVBDj9sW3doLobv7ACCjwGeHhLueOsYUW:sj8vs63h7iQroCgtg4KQsh

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4fd7f137b11f98d74d9d400f9c7abe2a7bb626ce42f733df2928e1bdf86a8c7cN.exe
    "C:\Users\Admin\AppData\Local\Temp\4fd7f137b11f98d74d9d400f9c7abe2a7bb626ce42f733df2928e1bdf86a8c7cN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\storti.exe
      "C:\Users\Admin\AppData\Local\Temp\storti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\storti.exe

    Filesize

    40KB

    MD5

    efb5a062bced8092356a38a8c3b6f7ee

    SHA1

    21d3cceebba31dd31fbf18840fd83a90b8c77d72

    SHA256

    8c91fa2f8af11c1f396388e5e36968ad8c5636f17974eeb5ed753a707604bd5f

    SHA512

    1b554ad2afd16c9cd19c5e9c8f39c5c8eeffbaa7c60851d1bf072fb11b86ed0b6f7af1024014e167a2ce0139358d9336a00b001de8d997b2af7bccad6ec5e92c

  • memory/5096-0-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/5096-1-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB