Analysis

  • max time kernel
    93s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:25

General

  • Target

    db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86_1648765408695.exe

  • Size

    242KB

  • MD5

    b4536ff04a41cb627463ed157b9c7521

  • SHA1

    db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86

  • SHA256

    144d8b9e77f9c36dbd271d84635cda3eb22b470dbb64e63b1e898041743918fa

  • SHA512

    c963ebfa9fcf119c4eef7f2c17266ce25b0e6e9554dac1da7e7098a7ff2e7af3c07cf70a913f386f2884208394f6035e282d128c59ded256d464b85d8fa549a1

  • SSDEEP

    6144:HNeZmCatx5SFXIcsCbeA79KHt8SCfqlmDwB/NCl:HNlCIx2XIcsrk9uyFwNI

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86_1648765408695.exe
    "C:\Users\Admin\AppData\Local\Temp\db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86_1648765408695.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe
      C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe C:\Users\Admin\AppData\Local\Temp\tffxie
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe
        C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe C:\Users\Admin\AppData\Local\Temp\tffxie
        3⤵
          PID:2388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\d4qtenh7b8kqj9rl

      Filesize

      211KB

      MD5

      94576d95657049b91c279af3fa84b961

      SHA1

      505cbbb2ea39257b67fe7d9f9df976e79819ca32

      SHA256

      e343ef1d1da6e8ac93b500868bdde07c7ba7970b75129c865cc05ef32b1b42e5

      SHA512

      070369ec1da96166039a12355130e135191eff3e0939ae109953954b4e4ba60cb5a918cddd851bb597bdb26b4b430ebc7cd79890250302c7eb882f2b694ddfd0

    • C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe

      Filesize

      5KB

      MD5

      ffe904bebf87531f8e5214b8b50aa7a9

      SHA1

      7ef3ca140c73dce0c7de875493be90a01e60ec48

      SHA256

      77f25d6adedeeefda3e4d103be5f19f1c227108216565a4d21135d31d5fc9e38

      SHA512

      3091041178650aef9b2bbaeaaf2a43427eb2f17f5d79daf67d8f3d812e7a5f3ad1939b31b5305dba432703d1d634ff9a6401f4cc5a363b8c5762272b24ba2b50

    • C:\Users\Admin\AppData\Local\Temp\tffxie

      Filesize

      7KB

      MD5

      acd719e997b0098acf16b07c01226a5e

      SHA1

      f692b0cd949714f13de60e3288747fe9a8a1d795

      SHA256

      c65e6fd3a6d1addccde72599bbcaa2cda77318e7507a19d9765f8d5514d9d343

      SHA512

      60d686e3262ef47241dbba9b47056ba6db446d3690ac702c78b8e7b4d275c02792470b7394fc3eb999cd924918639f5406e4f9579a5b6be1384c7d550297cea7

    • memory/5088-8-0x0000000001430000-0x0000000001432000-memory.dmp

      Filesize

      8KB