Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 14:01

General

  • Target

    0880268caf8c082a5e7649d10b837e36a896d479db6b6a85dbf3d364ed8f3e6aN.exe

  • Size

    14KB

  • MD5

    d3692d3249b6ec2f9d29fcc4038fd270

  • SHA1

    74cc844a9d13ceb9d833fb06e1be8ae7f103a08e

  • SHA256

    0880268caf8c082a5e7649d10b837e36a896d479db6b6a85dbf3d364ed8f3e6a

  • SHA512

    7563d87eef8547722a6a7c3fa204969fb28b01a44b1c10dad979e2b26728f5a2e4b32db85ac1b10ed212bd29d535c438a10f99f85250e3803084de247e5ab975

  • SSDEEP

    192:uliWhHeMiFSziB7rmUMGind0Z/fNQQoP1oynAPsxFZMi1wGZK+c1ZV:ulis+wQ7rmUMGid0Z3Nbe1xFCiCGZYZV

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0880268caf8c082a5e7649d10b837e36a896d479db6b6a85dbf3d364ed8f3e6aN.exe
    "C:\Users\Admin\AppData\Local\Temp\0880268caf8c082a5e7649d10b837e36a896d479db6b6a85dbf3d364ed8f3e6aN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\trueupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\trueupdater.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\trueupdater.exe

    Filesize

    14KB

    MD5

    a745196f49acfd231e24148997c9d8c2

    SHA1

    3440130c5cedeb5803a6d4c2b8125050253378df

    SHA256

    8179050fe4147c7f729f7ac2058703e04e5ea1ae88d0372f93e6c8329edfcebc

    SHA512

    76c51e667c22f98ebabb33db335224a4e9884018905e312fa7b19024a9dbc2beb5dc6e8cf4420eac072bc2b7d5903cd0412ff463b4da6c2d794100036ecf8b58

  • memory/2816-0-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/3532-9-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB