Analysis

  • max time kernel
    111s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 13:42

General

  • Target

    0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe

  • Size

    57KB

  • MD5

    a58aed5ff9750582aa8853b23a0df7a0

  • SHA1

    7bf459446790c14cef9687e9c5e684d147d56cd4

  • SHA256

    0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7

  • SHA512

    0890b04670c63ac49464c659fe38fcee6a25ad9cc0bf6c7c566de846dca0d366509a258b323fcb741338cb7c0b7f53df203aadd92b17bf518cee76ed23bd6cb8

  • SSDEEP

    768:DVGj3/ija+1Ict5YabfTWysKEIU1oTNVXSpMOq/OdeCmOtMZus6l3z9DTpLz2r:DVGQ+aLTW9P1oTSpMOqJClMZn6lZTpLs

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe
    "C:\Users\Admin\AppData\Local\Temp\0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7N.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vis16.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vis16.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RCX8E75.tmp

    Filesize

    57KB

    MD5

    0894b066a1be6ad725b211fb26d10214

    SHA1

    f8292953336278c0d145d8de476de4adc38fa49f

    SHA256

    ebea467a68a15885442edb01dd0ede99cf404e4f8462482bb3c36bbd19ddf7f6

    SHA512

    5858ee9bff281786549ec28a6025f003ec7eb8125f8134cbfc9a5e939a61c3222e77ee718604b16be14814615b79b18804dfa0a9452d201437220bf4a9c5c0ab

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vis16.exe

    Filesize

    57KB

    MD5

    a58aed5ff9750582aa8853b23a0df7a0

    SHA1

    7bf459446790c14cef9687e9c5e684d147d56cd4

    SHA256

    0109bb31795e67280f15c27c6cd5ac4ea61ddfffac8e8948dfd8ac49ec56dac7

    SHA512

    0890b04670c63ac49464c659fe38fcee6a25ad9cc0bf6c7c566de846dca0d366509a258b323fcb741338cb7c0b7f53df203aadd92b17bf518cee76ed23bd6cb8

  • C:\Users\Admin\vis16.dll

    Filesize

    35KB

    MD5

    87613cb96eceb921d2eb6ef2a93edf0c

    SHA1

    60c91526815f99080068e7c7ca63204da817475c

    SHA256

    4693920bbdc8370176e8786282216cce32cc2f8852814927bc806d39bc06e9fa

    SHA512

    05b179905d61ec6c30b93acc2b21ff5b9d986cb001f55b5f2c2af59ae7e3e8bab701977713c1286aac0710e8c8a1880727753e7fe77ede0553380d4e0460a7f8

  • memory/2556-25-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2556-5-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/2556-26-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/4808-28-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-27-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4808-24-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-30-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-32-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-34-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-36-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-38-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-40-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-42-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-44-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-46-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/4808-48-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB