Analysis
-
max time kernel
26s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 00:55
Behavioral task
behavioral1
Sample
8.3/IDA_Pro_8.3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8.3/IDA_Pro_8.3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
8.3/ida.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
8.3/ida.exe
Resource
win10v2004-20241007-en
General
-
Target
8.3/IDA_Pro_8.3.exe
-
Size
622KB
-
MD5
03f4334f9db7123733566cd8e53a06ca
-
SHA1
42062e09dae39703d3085c88bee0b22ed12ad653
-
SHA256
421dee20c98287f1e6483a9629ab388423a99cdc99e86d3757f220b167853be5
-
SHA512
7fabfe9b26f0b292e8606a9cd110d2be2734b7295003581d54fa87a568e18b260d49802efc8305fe77549ce446e4bb5857eb5003ff0a01551b1836f306f5f3f3
-
SSDEEP
12288:V/2tNzYBJUYdYlozwUhwazaL50DgkIAySn65NtBE:yYYizwU2PL50ByS6/tBE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation IDA_Pro_8.3.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation IDA_Pro_8.3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3860 2064 IDA_Pro_8.3.exe 83 PID 2064 wrote to memory of 3860 2064 IDA_Pro_8.3.exe 83 PID 3860 wrote to memory of 2964 3860 IDA_Pro_8.3.exe 93 PID 3860 wrote to memory of 2964 3860 IDA_Pro_8.3.exe 93 PID 3860 wrote to memory of 3228 3860 IDA_Pro_8.3.exe 95 PID 3860 wrote to memory of 3228 3860 IDA_Pro_8.3.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8.3\IDA_Pro_8.3.exe"C:\Users\Admin\AppData\Local\Temp\8.3\IDA_Pro_8.3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\8.3\IDA_Pro_8.3.exe"C:\Users\Admin\AppData\Local\Temp\8.3\IDA_Pro_8.3.exe" 22⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\8.3\idapyswitch.exe"C:\Users\Admin\AppData\Local\Temp\8.3\idapyswitch.exe" -s "C:\Users\Admin\AppData\Local\Temp\8.3\python311\python311.dll"3⤵PID:2964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Pause3⤵PID:3228
-
-