Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
5c1406bf58f18fexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
5c1406bf58f18fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
5c1406bf58f18fexeexeexeex.exe
-
Size
36KB
-
MD5
5c1406bf58f18fffcd0daf618ec3bcfb
-
SHA1
6c55e66d95b4026b6a01a64d19591be2fba0dc2e
-
SHA256
0be373c7fc2f03140ddf60a8b61717c10bcc9d1258a79a8d8acfed75687e4f1b
-
SHA512
fde35ae60e3dbbe335ab902f8b96e7cf60c2cd30e627055ad37c2515e161333f9f8cced05a25cc98eef1381ac83c237f5d18330af96d404c18cc5e48cd19d086
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+2ipdDZ:bgX4zYcgTEu6QOaryfjqDlCFZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 5c1406bf58f18fexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 3132 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 788 wrote to memory of 3132 788 5c1406bf58f18fexeexeexeex.exe 83 PID 788 wrote to memory of 3132 788 5c1406bf58f18fexeexeexeex.exe 83 PID 788 wrote to memory of 3132 788 5c1406bf58f18fexeexeexeex.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c1406bf58f18fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\5c1406bf58f18fexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51443cb4930b2d42e17cfd6573031c41a
SHA13456b2506a3a0147ab03f8a6772eced8d6d9f304
SHA2567b8bd89d7335a8065be5bfeeb1ea97b6003c6cce6ae4ae7a6fdf5aa63762a523
SHA5121c397abb2cd5633537b2e77b7dadb5637e9db2d903cc8d4c2b37ef0e16fdb441c2617e1e80f6722d4255276046c51557f2efa5d2c68c98e86b3d831409c5513e
-
Filesize
36KB
MD51443cb4930b2d42e17cfd6573031c41a
SHA13456b2506a3a0147ab03f8a6772eced8d6d9f304
SHA2567b8bd89d7335a8065be5bfeeb1ea97b6003c6cce6ae4ae7a6fdf5aa63762a523
SHA5121c397abb2cd5633537b2e77b7dadb5637e9db2d903cc8d4c2b37ef0e16fdb441c2617e1e80f6722d4255276046c51557f2efa5d2c68c98e86b3d831409c5513e
-
Filesize
36KB
MD51443cb4930b2d42e17cfd6573031c41a
SHA13456b2506a3a0147ab03f8a6772eced8d6d9f304
SHA2567b8bd89d7335a8065be5bfeeb1ea97b6003c6cce6ae4ae7a6fdf5aa63762a523
SHA5121c397abb2cd5633537b2e77b7dadb5637e9db2d903cc8d4c2b37ef0e16fdb441c2617e1e80f6722d4255276046c51557f2efa5d2c68c98e86b3d831409c5513e