Analysis

  • max time kernel
    96s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 12:30

General

  • Target

    b0fc9221a8c562834aa26bd8c9e9c020612ae95464fc90f36dbf2c7af72b3587N.exe

  • Size

    49KB

  • MD5

    ccb8db1ac580047228d8eb69e75cfa50

  • SHA1

    e17dd6cd21c47d997357eaf962f2bde75194211e

  • SHA256

    b0fc9221a8c562834aa26bd8c9e9c020612ae95464fc90f36dbf2c7af72b3587

  • SHA512

    9beebe84c8453f7bb2bf1e6cb1236e62a9796aa42a7862dfcc74ce3f835937598ff453b1b677b88f187801f58e0aaf23cd5a4157296feedb5649e3c274a76ced

  • SSDEEP

    768:Q8eRHO9lFh0ul16sh7iQroCH/f+RjFBSuB2XVcn:Q9lOZ16sh7iQroCuRB0ub

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0fc9221a8c562834aa26bd8c9e9c020612ae95464fc90f36dbf2c7af72b3587N.exe
    "C:\Users\Admin\AppData\Local\Temp\b0fc9221a8c562834aa26bd8c9e9c020612ae95464fc90f36dbf2c7af72b3587N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe

    Filesize

    50KB

    MD5

    280665620b10b81a51ab41865e74dfa4

    SHA1

    c9d4eb8fbf6935daa6a8da13de3d8874f56f89b4

    SHA256

    7c5315fa0a2336bc0be041beb56353ad212c169a7b39ca56d7bfd85c92f58709

    SHA512

    9266add44a867555529d6c54c7b6cf563be8b184698592f580f5bd5484d36e604291a70c2a25f45528be0176009fb293c20b646f948b3b0ee8c5779a31f93366

  • memory/536-14-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3912-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3912-1-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/3912-2-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/3912-12-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB