Analysis

  • max time kernel
    123s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 17:49

General

  • Target

    2024-12-25/unknown-ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5.exe

  • Size

    2.7MB

  • MD5

    b6c0b8f301a977e10c5cae4c226291f0

  • SHA1

    471d41a7d1bc97a40307e7d77d363a73062ccb6d

  • SHA256

    ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5

  • SHA512

    ca78ea0e477f93e438a7a37d20f2876da540ed9f1cbd51411cac5e4c1003041e53ef6c94b126af657e8d9cc34d45b4b9d17269a41d19a849d7bf103c8459272c

  • SSDEEP

    49152:vh+ZkldoPK8Ya8zPp4NE88c2TL8HoBW0VOnNfo4hDc+J+Hl1KH0PHQ2R4avMEO:42cPK82zPp4NE88c2TgHyb0NzhDcyKU7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\evdmem.exe
      "C:\Users\Admin\AppData\Local\Temp\evdmem.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\1421421241\path.ini

    Filesize

    189B

    MD5

    35c49b5d9a7d9cd3b5796852d152e32c

    SHA1

    6ce7c9a7f60ae3d3a8adae4da284b3037c61b332

    SHA256

    535200dd08c38e7766e24be09cf3c4d8bcecda4066ccf3efd7b30122350b0076

    SHA512

    c920ef253a58a9ef32719507cec50a5a36bac991c4f5b82860b6bc8439cbd66d2f4beed581251bf031dd3d2cda03eec8120fca72517b175e4d9da656cbfa2b5c

  • C:\Users\Admin\AppData\Local\Temp\evdmem.exe

    Filesize

    2.7MB

    MD5

    785273f11b970ac8de4c3cb122dd96af

    SHA1

    92b288f3f90785ef03f41e6d4f90e885892238bb

    SHA256

    b7752a27ef83975a301cbabead04d6485cc27478bbfc73291af16d8eb095b314

    SHA512

    34bc308c4b530b01fff56c2c3278c4066b206143b74cf02dc8028adb5a599576855e53ef9558e082f22cd1d54d8cdaa6120c4ca0ba0911c28dbbdc0d5a118704