Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
1fbf33cccacce6exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1fbf33cccacce6exeexeexeex.exe
Resource
win10v2004-20230621-en
General
-
Target
1fbf33cccacce6exeexeexeex.exe
-
Size
31KB
-
MD5
1fbf33cccacce6f119398250a3d73424
-
SHA1
65186f9a4969dbbf1407167bc249a91735df77cd
-
SHA256
beec08377c451c4ea0ab935123bb4cee3ce6b65256379ffcda7531372214f8c2
-
SHA512
213eae3335544103852213e3225d8cf16b9fa3285eedce25431c10dd33ae3ff9023c594f574cfdbcfb29b62f96569da713f4fb0a4da52bc91fb17f24b2b60ad1
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjJ3yG:V6QFElP6n+gMQMOtEvwDpjJT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Control Panel\International\Geo\Nation 1fbf33cccacce6exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 3012 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4208 wrote to memory of 3012 4208 1fbf33cccacce6exeexeexeex.exe 84 PID 4208 wrote to memory of 3012 4208 1fbf33cccacce6exeexeexeex.exe 84 PID 4208 wrote to memory of 3012 4208 1fbf33cccacce6exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fbf33cccacce6exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\1fbf33cccacce6exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD582428c300ac47d8e72d7e271cd353fb4
SHA14cb098443d0ca1a44c2d35c8ea11372b5af7089b
SHA256f2fce410af2848b7cb0bef3fd7ec120ed527987584722ca3199a8f347221d5d2
SHA512be1f905d0cc61ce33e9637716fa3992a54876c95556eb7b87f7706a8dcd90a39b8e400eb3b51ab8fdd3c2a527cb47fe962954d1e9be8396c16d38ac0b707177e
-
Filesize
31KB
MD582428c300ac47d8e72d7e271cd353fb4
SHA14cb098443d0ca1a44c2d35c8ea11372b5af7089b
SHA256f2fce410af2848b7cb0bef3fd7ec120ed527987584722ca3199a8f347221d5d2
SHA512be1f905d0cc61ce33e9637716fa3992a54876c95556eb7b87f7706a8dcd90a39b8e400eb3b51ab8fdd3c2a527cb47fe962954d1e9be8396c16d38ac0b707177e
-
Filesize
31KB
MD582428c300ac47d8e72d7e271cd353fb4
SHA14cb098443d0ca1a44c2d35c8ea11372b5af7089b
SHA256f2fce410af2848b7cb0bef3fd7ec120ed527987584722ca3199a8f347221d5d2
SHA512be1f905d0cc61ce33e9637716fa3992a54876c95556eb7b87f7706a8dcd90a39b8e400eb3b51ab8fdd3c2a527cb47fe962954d1e9be8396c16d38ac0b707177e