Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 09:49

General

  • Target

    7919424f013a3292dec9f0af15bd7b188b065e86ebf336927fb6e2cf55e0811f.exe

  • Size

    20KB

  • MD5

    14d5eebb7dfc633c483a652e7c02bb32

  • SHA1

    6900fc3e4b9cf48b56ded91d96c29ffaec0c51a2

  • SHA256

    7919424f013a3292dec9f0af15bd7b188b065e86ebf336927fb6e2cf55e0811f

  • SHA512

    7444368aef2c8da5bf80cdea0fa0addee4915c33eebec10427d2aa3c2d65c2c07acdfac2ddc576e7c260570339f884b636c59eca34df51a36cfa76297af2857b

  • SSDEEP

    192:SRTQZOwUdXbg2+K+mBPu5wwKqlMJ7/+K+J3QUyqQ8888Lb8+nZ5LfH2kPdi+0J0F:WW5wwhuqL6hwqLY8lsV6

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7919424f013a3292dec9f0af15bd7b188b065e86ebf336927fb6e2cf55e0811f.exe
    "C:\Users\Admin\AppData\Local\Temp\7919424f013a3292dec9f0af15bd7b188b065e86ebf336927fb6e2cf55e0811f.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Users\Admin\AppData\Local\Temp\laszi.exe
      "C:\Users\Admin\AppData\Local\Temp\laszi.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\laszi.exe

    Filesize

    20KB

    MD5

    a4aa948cbca2c9b905f3cd721f5f3463

    SHA1

    dbc658fa137c9bfe04c85e44ff0de5fc9af1b3bf

    SHA256

    fed70d3911f4d4aeafbf25107d5a18b61026720d69268d91b9c043b10e50626e

    SHA512

    4db850f3f544f83ab60e3cceee1f5b218240fb14700f624038a59e147a73703df5094bb9f11a58583c1e9f8f2e140e833df3ff30c0e23e10aef29e6c5cafefed

  • memory/1744-9-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3812-0-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB