Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 15:09
Static task
static1
Behavioral task
behavioral1
Sample
05c9c79dde8fcfexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
05c9c79dde8fcfexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
05c9c79dde8fcfexeexeexeex.exe
-
Size
39KB
-
MD5
05c9c79dde8fcfdcf48df459d94dd09e
-
SHA1
2f5d5103e34204bda5a6ea3d94732bb2d0e57971
-
SHA256
d67c3b7602f71da8b4cccdb993fcc40961d879f0c4993ba8715176b9c624bac8
-
SHA512
8ef4706b6cae1c37c31363851d6054563f2e706e720dcb227eb1b486f74bd9777ed9e125a0e6d2cbfe69db95f350866422817195a923352824136693c39e4e87
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVajSKm5uzOH7s1Z:X6QFElP6n+gJQMOtEvwDpjBcSKm5uG4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation 05c9c79dde8fcfexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4920 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4920 2276 05c9c79dde8fcfexeexeexeex.exe 80 PID 2276 wrote to memory of 4920 2276 05c9c79dde8fcfexeexeexeex.exe 80 PID 2276 wrote to memory of 4920 2276 05c9c79dde8fcfexeexeexeex.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c9c79dde8fcfexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\05c9c79dde8fcfexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD53691bcdeae6a11d5799a0ca1ebf34881
SHA15d0c82931257273ff61d3339823cf71a0ba1c6d6
SHA25654a79a1a429d1f0943acbebbf9f5b2ba04a24549e85a1e87dc1df6ea72e4ad81
SHA51283ab710d539b22984de7eafe18898f4632873e1c957e3983565590f2e95ed2fe2a714d04b0846f96d862bca0eda0f2c15a79b2c59474f03aeb50bd1a7ff16e06
-
Filesize
39KB
MD53691bcdeae6a11d5799a0ca1ebf34881
SHA15d0c82931257273ff61d3339823cf71a0ba1c6d6
SHA25654a79a1a429d1f0943acbebbf9f5b2ba04a24549e85a1e87dc1df6ea72e4ad81
SHA51283ab710d539b22984de7eafe18898f4632873e1c957e3983565590f2e95ed2fe2a714d04b0846f96d862bca0eda0f2c15a79b2c59474f03aeb50bd1a7ff16e06
-
Filesize
39KB
MD53691bcdeae6a11d5799a0ca1ebf34881
SHA15d0c82931257273ff61d3339823cf71a0ba1c6d6
SHA25654a79a1a429d1f0943acbebbf9f5b2ba04a24549e85a1e87dc1df6ea72e4ad81
SHA51283ab710d539b22984de7eafe18898f4632873e1c957e3983565590f2e95ed2fe2a714d04b0846f96d862bca0eda0f2c15a79b2c59474f03aeb50bd1a7ff16e06