Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 12:36
Behavioral task
behavioral1
Sample
29436bd7b8ddc5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
29436bd7b8ddc5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
29436bd7b8ddc5exeexeexeex.exe
-
Size
80KB
-
MD5
29436bd7b8ddc5bffe19dae2fc044ddf
-
SHA1
340e466b3b6691ba34471fa2949e27c33aa72e08
-
SHA256
b46066eaf30f2a9c013efde40db76fd1966d113e4d533758e516be44a2faa305
-
SHA512
d4003fcbe9db22cd4e2aae42a7637e25a59035fa67071f23941c2199397141bd01ea8b595d92ef72a9f40c0eccbfeba7c102124feee8bad2c6ba0d32682006bb
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUCo:1nK6a+qdOOtEvwDpjm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation 29436bd7b8ddc5exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4380 asih.exe -
resource yara_rule behavioral2/memory/3228-141-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x000800000002320a-145.dat upx behavioral2/files/0x000800000002320a-147.dat upx behavioral2/files/0x000800000002320a-148.dat upx behavioral2/memory/4380-156-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4380 3228 29436bd7b8ddc5exeexeexeex.exe 83 PID 3228 wrote to memory of 4380 3228 29436bd7b8ddc5exeexeexeex.exe 83 PID 3228 wrote to memory of 4380 3228 29436bd7b8ddc5exeexeexeex.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\29436bd7b8ddc5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\29436bd7b8ddc5exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5a5f827708dfea650a32814d920f543ae
SHA1c72608bd8eebeaf169c8c83efd2149b6d350baab
SHA25672cc664f5159af14a1bbaf95dfd2ff05e2c308e6940dd49d74e813913eb37bc7
SHA51284984f3a84630138ffc81b2c785182ab9837606209b9e54dc68cf75b42884c94a2faff76aee4f892ac3cc01b9192aef0baf71f8a0379e668ad51b13b06c29757
-
Filesize
81KB
MD5a5f827708dfea650a32814d920f543ae
SHA1c72608bd8eebeaf169c8c83efd2149b6d350baab
SHA25672cc664f5159af14a1bbaf95dfd2ff05e2c308e6940dd49d74e813913eb37bc7
SHA51284984f3a84630138ffc81b2c785182ab9837606209b9e54dc68cf75b42884c94a2faff76aee4f892ac3cc01b9192aef0baf71f8a0379e668ad51b13b06c29757
-
Filesize
81KB
MD5a5f827708dfea650a32814d920f543ae
SHA1c72608bd8eebeaf169c8c83efd2149b6d350baab
SHA25672cc664f5159af14a1bbaf95dfd2ff05e2c308e6940dd49d74e813913eb37bc7
SHA51284984f3a84630138ffc81b2c785182ab9837606209b9e54dc68cf75b42884c94a2faff76aee4f892ac3cc01b9192aef0baf71f8a0379e668ad51b13b06c29757