Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 23:07

General

  • Target

    1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe

  • Size

    481KB

  • MD5

    a7ee819bfb900ad6d20ebe4d1da8af4c

  • SHA1

    b50f78b7447b040f57d115c70c5fb4e62cac70f3

  • SHA256

    b6331431d23acf4528527316a993890117bac208c604b054622efee21cbffcf5

  • SHA512

    2683efbd00d03bc838e65b8bcc0640faabfbc63e9055b5b81aa42f338b25cf5998271df877fdf5f8fe4a13a0f3d93cdbf0ae71261753333702a79a824f5685e8

  • SSDEEP

    12288:3uD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDST+DY:q09AfNIEYsunZvZ19ZAs

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
    "C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\amdzzcia.vbs"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\registros.dat

    Filesize

    144B

    MD5

    0270a6efd1cd19379f8c83a778d4f31a

    SHA1

    6826bc7b7d65a4ccbaae04065039b4485ab4b56a

    SHA256

    549d6ce82df6c229fe2bdf60fa16b3d113b7041bd8c498dd62cc5dc174fbed50

    SHA512

    45cbd115dbc79806f415c5341d2098d44d1de1bca51366dc243ed375a9da9e9bd3ce63d83043a36b723b3790b99013852ac1ca4d747786b10130a2e7b1ed4499

  • C:\Users\Admin\AppData\Local\Temp\amdzzcia.vbs

    Filesize

    828B

    MD5

    fd4d288901413e8d992e3382e6a80e00

    SHA1

    df54ad1fda8372c8b3a5273203b3ec9a8e0107a0

    SHA256

    7610f747ba60dd471083b15d25eb6321c3983836bbe390e4c197124a6f243b90

    SHA512

    e556e74fc662eebb496eeac1ebee4e3c7af089ae2743905ba66841f72f28a3f95327a23af47f7d3c1b334af41fb49f819589ccb0195aa8f409d8e67bf20b6163