Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 16:46
Behavioral task
behavioral1
Sample
118be8026c733fexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
118be8026c733fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
118be8026c733fexeexeexeex.exe
-
Size
57KB
-
MD5
118be8026c733f4270500004ff990efc
-
SHA1
735c7c8f38223ad8e4c3b7eb958e256064d1b182
-
SHA256
0278257203a485bf4c140a8c09e92f47b41579082fe62f898fc89c35de99071f
-
SHA512
d01a71674ddcc42c4eaeb70b43d45913f8018c30a412d5ff5d9e59b9d2e300bb871a3b224af2d2df776369dc65a839eece1b32571cdab1b961b029c429d58f3b
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTFH39y:T6a+rdOOtEvwDpjNM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation 118be8026c733fexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 664 asih.exe -
resource yara_rule behavioral2/memory/4944-141-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023254-145.dat upx behavioral2/files/0x0008000000023254-147.dat upx behavioral2/files/0x0008000000023254-148.dat upx behavioral2/memory/664-156-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 664 4944 118be8026c733fexeexeexeex.exe 85 PID 4944 wrote to memory of 664 4944 118be8026c733fexeexeexeex.exe 85 PID 4944 wrote to memory of 664 4944 118be8026c733fexeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\118be8026c733fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\118be8026c733fexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD51f32e60a41be7282431bdcea39e51a82
SHA12a21f1b9440c36463e9d452ac47ba9e8ac891984
SHA256828259e2d1cad88cf8d2342e5d211f4824d88c077c97d1518f12c6b30da9beb0
SHA5126062f9bf04dac1bd1fa3c7f8f5f7c71d9885a8f2ad64d9c01b8e98bf1e4fa6349c9da24f9dbbf345a66132824549362dd2a45a5e8fa9b3ee9f6fcbf24fca4380
-
Filesize
57KB
MD51f32e60a41be7282431bdcea39e51a82
SHA12a21f1b9440c36463e9d452ac47ba9e8ac891984
SHA256828259e2d1cad88cf8d2342e5d211f4824d88c077c97d1518f12c6b30da9beb0
SHA5126062f9bf04dac1bd1fa3c7f8f5f7c71d9885a8f2ad64d9c01b8e98bf1e4fa6349c9da24f9dbbf345a66132824549362dd2a45a5e8fa9b3ee9f6fcbf24fca4380
-
Filesize
57KB
MD51f32e60a41be7282431bdcea39e51a82
SHA12a21f1b9440c36463e9d452ac47ba9e8ac891984
SHA256828259e2d1cad88cf8d2342e5d211f4824d88c077c97d1518f12c6b30da9beb0
SHA5126062f9bf04dac1bd1fa3c7f8f5f7c71d9885a8f2ad64d9c01b8e98bf1e4fa6349c9da24f9dbbf345a66132824549362dd2a45a5e8fa9b3ee9f6fcbf24fca4380