Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
28578c337933d4exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
28578c337933d4exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
28578c337933d4exeexeexeex.exe
-
Size
146KB
-
MD5
28578c337933d4ce9abdbcbb4a501f3a
-
SHA1
d2aba8b2217f81d58c4a97c6ad0ed38a3da2fe8a
-
SHA256
0ae4c3e1d7069c4740bfa6d1ca5626f01b415edd64734c988a8702af63e550b3
-
SHA512
26e8edc302d3deaf1e122b61e14a810cf6d517b858e1709ad89e09d0c0dca14755f86d783e3012cbabd683c77ec8c4a16e6cd98fd9ce71e4921db5b764f1dad5
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooNv:V6a+pOtEvwDpjt22D
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation 28578c337933d4exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 384 wrote to memory of 1996 384 28578c337933d4exeexeexeex.exe 83 PID 384 wrote to memory of 1996 384 28578c337933d4exeexeexeex.exe 83 PID 384 wrote to memory of 1996 384 28578c337933d4exeexeexeex.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\28578c337933d4exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\28578c337933d4exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD57c3010b8d137254071e22db5b48d10cf
SHA12e6786f1cfb9b7fe53ce16742a7daaea9b88f932
SHA25611703807c12e8e0a9a5c472113d212bddabc90a22496d5e0e3d6f95c9c7d9e88
SHA512f983087c00534dcc7518f65118f74805683ea377abd46fb07c230e4f0c2fbf44072dc25308574b752c998ab0b44e1a045b2188df89ae1d7e8a9e0f657b448ed4
-
Filesize
146KB
MD57c3010b8d137254071e22db5b48d10cf
SHA12e6786f1cfb9b7fe53ce16742a7daaea9b88f932
SHA25611703807c12e8e0a9a5c472113d212bddabc90a22496d5e0e3d6f95c9c7d9e88
SHA512f983087c00534dcc7518f65118f74805683ea377abd46fb07c230e4f0c2fbf44072dc25308574b752c998ab0b44e1a045b2188df89ae1d7e8a9e0f657b448ed4
-
Filesize
146KB
MD57c3010b8d137254071e22db5b48d10cf
SHA12e6786f1cfb9b7fe53ce16742a7daaea9b88f932
SHA25611703807c12e8e0a9a5c472113d212bddabc90a22496d5e0e3d6f95c9c7d9e88
SHA512f983087c00534dcc7518f65118f74805683ea377abd46fb07c230e4f0c2fbf44072dc25308574b752c998ab0b44e1a045b2188df89ae1d7e8a9e0f657b448ed4