Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 21:30

General

  • Target

    83f0a2b735e8e2ad8cd95dac7d068397a06f63a9410276032f44bd52f4bd5ea0N.exe

  • Size

    27KB

  • MD5

    8ec1e4a6daa5b5a70b0154d96ffeb020

  • SHA1

    b4027d9b849176a9ad451da2e74237f0ae7456f3

  • SHA256

    83f0a2b735e8e2ad8cd95dac7d068397a06f63a9410276032f44bd52f4bd5ea0

  • SHA512

    eed557ce4d7359a995047f1fc463ee2438578c8070c73f85d59e6b29e5c9d7ce0db022b4696b100a0c4ae508ed33612961100a079c51dc6eb37b56981345b57b

  • SSDEEP

    768:Rr9jcUKmGhQp9NvTqZxfVYtdgI2MyzNORQtvflIwoHNV2XBFV72BOlA7ZsUIij6:3jcUcW9NOZwtdgI2MyzNORQtvflIwoHC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83f0a2b735e8e2ad8cd95dac7d068397a06f63a9410276032f44bd52f4bd5ea0N.exe
    "C:\Users\Admin\AppData\Local\Temp\83f0a2b735e8e2ad8cd95dac7d068397a06f63a9410276032f44bd52f4bd5ea0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\hhcbnaff.exe
      "C:\Users\Admin\AppData\Local\Temp\hhcbnaff.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hhcbnaff.exe

    Filesize

    27KB

    MD5

    739aa3ba8d72faf6b1c7e5620469f4ce

    SHA1

    968779928a15e8ccac57d7b44b6ed88fc4663c70

    SHA256

    234e28e439d10f202f1c41708bcee941de1e253a05346a03fcfbaadcdf2053eb

    SHA512

    7f73a3d615df782b0f608a5bcb761339c28f957f6cc6e185b39633f3259568bb1c6d8a689089c040f0bdbf35f9285e2434168ed36667e848a2288130b7bb5b07

  • memory/1668-0-0x0000000002130000-0x0000000002137000-memory.dmp

    Filesize

    28KB

  • memory/1668-1-0x0000000002130000-0x0000000002137000-memory.dmp

    Filesize

    28KB

  • memory/1668-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4336-25-0x00000000004D0000-0x00000000004D7000-memory.dmp

    Filesize

    28KB