Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 11:09
Behavioral task
behavioral1
Sample
74f2dfeecffbf8exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
74f2dfeecffbf8exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
74f2dfeecffbf8exeexeexeex.exe
-
Size
42KB
-
MD5
74f2dfeecffbf8b5f2dcdb525d3abd68
-
SHA1
b13e2c7a92d7e536094db1dd2af6160a37b1a7dc
-
SHA256
2adfa64aea885c62c7ae76cc2c1190b291b47361e26f75e351e105d86953bd73
-
SHA512
cefa078a9c69ab9cb4c10c45e03b17b888726be843f7ea32bb150606936a276b168dadd7d474c67a1d0594a2e3085e67f5a6ff75c0b4ee6d97a44ec3cbe7c644
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOQjCMOXde:qUmnpomddpMOtEvwDpjjaYaFAetYe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation 74f2dfeecffbf8exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 asih.exe -
resource yara_rule behavioral2/memory/2932-141-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x00080000000231e8-145.dat upx behavioral2/files/0x00080000000231e8-147.dat upx behavioral2/files/0x00080000000231e8-148.dat upx behavioral2/memory/2220-157-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2220 2932 74f2dfeecffbf8exeexeexeex.exe 84 PID 2932 wrote to memory of 2220 2932 74f2dfeecffbf8exeexeexeex.exe 84 PID 2932 wrote to memory of 2220 2932 74f2dfeecffbf8exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f2dfeecffbf8exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\74f2dfeecffbf8exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD51a10aab474f18be1b61c57b153c6f6aa
SHA1d9da788248aa386f16270f1869361756d064a845
SHA256d42cfae9e795f37e819357ae4474bf8e5885682ef5c9d7bf9f58ee60d6ddbfa9
SHA5125ec7b29d38f99cec5a035085675cc0ef916a67abec4a53c341f6917b6021d1cae48e131db9c1d1c051f1f24ead91d217cda5353aa713fddecaef97dc93fb5e70
-
Filesize
42KB
MD51a10aab474f18be1b61c57b153c6f6aa
SHA1d9da788248aa386f16270f1869361756d064a845
SHA256d42cfae9e795f37e819357ae4474bf8e5885682ef5c9d7bf9f58ee60d6ddbfa9
SHA5125ec7b29d38f99cec5a035085675cc0ef916a67abec4a53c341f6917b6021d1cae48e131db9c1d1c051f1f24ead91d217cda5353aa713fddecaef97dc93fb5e70
-
Filesize
42KB
MD51a10aab474f18be1b61c57b153c6f6aa
SHA1d9da788248aa386f16270f1869361756d064a845
SHA256d42cfae9e795f37e819357ae4474bf8e5885682ef5c9d7bf9f58ee60d6ddbfa9
SHA5125ec7b29d38f99cec5a035085675cc0ef916a67abec4a53c341f6917b6021d1cae48e131db9c1d1c051f1f24ead91d217cda5353aa713fddecaef97dc93fb5e70