Analysis

  • max time kernel
    94s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 09:17

General

  • Target

    b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359eN.exe

  • Size

    67KB

  • MD5

    694d8bfd652759013976537a57f0b520

  • SHA1

    fccff9ab35453ec423dfca7a8eb6a42faa2cf089

  • SHA256

    b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359e

  • SHA512

    fb36df6ef6989e18f5bce835a47f97c4c58153c9055e4e1dfc969f7e5b9704856ca47158e2e29c69b6de2ada26f955c52e7f83a9ac4bdd91e869f7db9b711820

  • SSDEEP

    768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsPpzSd3xyV:r9l+W8xFt6sh7iQroCoRB0u0sPpzStxO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359eN.exe
    "C:\Users\Admin\AppData\Local\Temp\b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359eN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe

    Filesize

    67KB

    MD5

    335a2f40e1ae476dd48e161f269448f0

    SHA1

    391dd84e7a1a086a33c2a0032db47804051d37f5

    SHA256

    ac7f918d67ee5b61a790d5f708821e8f72f411aed9c0eebd25eb98f595861360

    SHA512

    285597779107898b15a01c5d423aa968b63378a67f7efb6c5c1fe5d7df04dab7a8f0bc7ac6a1348e5ec19268c3120307a3285601b8d0f191aacc83a5fa57f318

  • memory/3764-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3764-1-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/3764-2-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/3764-13-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4428-28-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB