Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 14:20
Behavioral task
behavioral1
Sample
31567790abe63aexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
31567790abe63aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
31567790abe63aexeexeexeex.exe
-
Size
86KB
-
MD5
31567790abe63aa9e6681162091919ed
-
SHA1
966634b3af496e931125c6013fa7455da9cd2fa6
-
SHA256
48a0265e6e0f24affc1899e40ab1f430c4f16079c85258eb02139bf1e12efc4d
-
SHA512
40949e9a48e8bab1f128a8b36c1bb90c63550a81b1d86f8b4e6353ddd72082c541db015ee8a543383316441725211d03d232460ef88cf36e61f3dd40b485d690
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTsCbInE:T6a+rdOOtEvwDpjNB3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation 31567790abe63aexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 asih.exe -
resource yara_rule behavioral2/memory/1736-141-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x00050000000006e7-145.dat upx behavioral2/files/0x00050000000006e7-147.dat upx behavioral2/files/0x00050000000006e7-148.dat upx behavioral2/memory/4808-156-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4808 1736 31567790abe63aexeexeexeex.exe 85 PID 1736 wrote to memory of 4808 1736 31567790abe63aexeexeexeex.exe 85 PID 1736 wrote to memory of 4808 1736 31567790abe63aexeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\31567790abe63aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\31567790abe63aexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5ba8935edf200512c630d3e8a73d17ed7
SHA14fad06ee37b587426252573c91337ff3fd2b586d
SHA2567d7b668bbec5209b34396df9db2eaccdc196dc112cee5bd380035ec240729b9e
SHA5126c0507b0c84dc29686ec7665601472877d6d80898cc3c88ce68b25c6c32a52c0a9c2642679827afbc4dcf1259e4ec09127af21b119983bfb2625e8762c4c4658
-
Filesize
86KB
MD5ba8935edf200512c630d3e8a73d17ed7
SHA14fad06ee37b587426252573c91337ff3fd2b586d
SHA2567d7b668bbec5209b34396df9db2eaccdc196dc112cee5bd380035ec240729b9e
SHA5126c0507b0c84dc29686ec7665601472877d6d80898cc3c88ce68b25c6c32a52c0a9c2642679827afbc4dcf1259e4ec09127af21b119983bfb2625e8762c4c4658
-
Filesize
86KB
MD5ba8935edf200512c630d3e8a73d17ed7
SHA14fad06ee37b587426252573c91337ff3fd2b586d
SHA2567d7b668bbec5209b34396df9db2eaccdc196dc112cee5bd380035ec240729b9e
SHA5126c0507b0c84dc29686ec7665601472877d6d80898cc3c88ce68b25c6c32a52c0a9c2642679827afbc4dcf1259e4ec09127af21b119983bfb2625e8762c4c4658