Analysis

  • max time kernel
    74s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:17

General

  • Target

    df43aaf53cf823766f98d138827f3931.exe

  • Size

    8KB

  • MD5

    df43aaf53cf823766f98d138827f3931

  • SHA1

    371d4384bcf0098c3decca695268d4255f3b87bf

  • SHA256

    b851b7e9300924a6af5e9030c320a442cf65cd5276d216aadf114ae1737d8b38

  • SHA512

    4b187c397a23fd1c8395b27620ebd30ac8336bf0b75a400bfb718a8c1368654f83c84e6564d0b4f8661c8f01529b5935bfee6a2d0a9bf4a29b4283be99a0892d

  • SSDEEP

    96:E2YjX/R8Dn4qwuK/ncVqZ790AvKn6riLNQ+e3q5dNtosZ2Y843TWVWe16GRlLtfW:GjmDn+nAK9/vkvWHqzL3aVPDR9Nin

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df43aaf53cf823766f98d138827f3931.exe
    "C:\Users\Admin\AppData\Local\Temp\df43aaf53cf823766f98d138827f3931.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\System32\cscript.exe
      "C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Tempvermin.vbs
      2⤵
      • Blocklisted process makes network request
      PID:3944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\test.zip

    Filesize

    3.2MB

    MD5

    10d8745503700fbb314af537af37e45a

    SHA1

    94dc286a4c3485f76f78ec73384d292494107c28

    SHA256

    34dc7ec918fb983b250c3edc294325b3e6e8702a93c0ea53df8c679523fc3777

    SHA512

    3535b92b68bd51bfac4e445ae679ce3ec572970a0da4c6f7ca9b85bf8a9d6fcc9b18510affda7f53744f389f01a7b5e0e0187f7d93f20fbb9b12227caa52498f

  • C:\Users\Admin\AppData\Local\Tempvermin.vbs

    Filesize

    1022B

    MD5

    be0465d478d6de4f33444a26c817f3c0

    SHA1

    a36cf4f4f7e31317ce3c99c8cb01b6ec312618e4

    SHA256

    22969b4b10e73229da4d65b1481c00950b1167d50269d60d9c2bab0dac74ea14

    SHA512

    d57eb272c2fe5a64009b171fdaa31c37f806ecb35eab931e0a9ce1a4deb1a860ef50a3e48c6d943b716d7f007fd0959bf0eb9047faed9e861d863bc0a0ff3b0a

  • memory/3980-0-0x00007FFAE0543000-0x00007FFAE0545000-memory.dmp

    Filesize

    8KB

  • memory/3980-1-0x0000000000010000-0x0000000000018000-memory.dmp

    Filesize

    32KB

  • memory/3980-192-0x00007FFAE0543000-0x00007FFAE0545000-memory.dmp

    Filesize

    8KB