Analysis

  • max time kernel
    92s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 13:46

General

  • Target

    e55b07b744b5e52011ca58654679f3ab635bcf0dc818467aa073fe5ac2c3b3eb.exe

  • Size

    30KB

  • MD5

    91ec7bc635b665e7df3ecdf0b28a865c

  • SHA1

    51297acee7a173a4e91898276cd2b980a11f04e9

  • SHA256

    e55b07b744b5e52011ca58654679f3ab635bcf0dc818467aa073fe5ac2c3b3eb

  • SHA512

    29458b483c1950f5f8ae628a5fdac887393ac34f7be41b6744d7522daed94cc0adc37e4ada3af773eb10c17b770deef33261345b74d628d511c8445d186b0dd4

  • SSDEEP

    384:uTQWckBeEd6ml1pcg7F3Gi+CWIG7g2kzBsxub1tBKQv1Ky9F0LB:uxckEEd62J7F3GigIG7fk5R9/6LB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e55b07b744b5e52011ca58654679f3ab635bcf0dc818467aa073fe5ac2c3b3eb.exe
    "C:\Users\Admin\AppData\Local\Temp\e55b07b744b5e52011ca58654679f3ab635bcf0dc818467aa073fe5ac2c3b3eb.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Local\Temp\codecsupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\codecsupdater.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\codecsupdater.exe

    Filesize

    30KB

    MD5

    c905d7309a3fb27d151ddbfa88ed6dc6

    SHA1

    a61b228d35406f41b18c14fd7ba994d1c3967a98

    SHA256

    3ace0c470e0a4ebc485d1a48e445e2737f541819cc2c434dc89696fe137e4b07

    SHA512

    34f015246da3a7d4307897fc31f159416fc5211b3ae73426b06a14dd53aa624d42ed60aaafa28109f46177200eba28e8aae30d8270427f0694ec6c04259f3fb9

  • memory/1256-9-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/4860-0-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB