Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 10:42
Static task
static1
Behavioral task
behavioral1
Sample
70df6930924e75exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
70df6930924e75exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
70df6930924e75exeexeexeex.exe
-
Size
31KB
-
MD5
70df6930924e750e6b4e4ea99ca7e12e
-
SHA1
79c015e6710471f9d690a0d9cee2f8f4b312a454
-
SHA256
1f1e471fb86bd98e608063126ad7f012520f1fbfcf22147d9cfe14c24364c19a
-
SHA512
9f91c44a92451bd2984f40d61563084996f38b51955ea57db26cf256d8137e142748a679e1fab30a47e4134979d22d5f1667ab27ae0aa09c049ba2aa156a006e
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjB9iYpR:X6QFElP6n+gJQMOtEvwDpjBHR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation 70df6930924e75exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 3416 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1052 wrote to memory of 3416 1052 70df6930924e75exeexeexeex.exe 84 PID 1052 wrote to memory of 3416 1052 70df6930924e75exeexeexeex.exe 84 PID 1052 wrote to memory of 3416 1052 70df6930924e75exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\70df6930924e75exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\70df6930924e75exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5a99944a9aa12c38d78582993a3cfe792
SHA1c20a7922cf677f1ab054be1971878822d080ae56
SHA256bd72af0028b2fba27bd7f6640dfd473834bb557f12f1ca3d6887493a4b8ab0ef
SHA51225d3490fa5823d4ffe4132db58450715891c11382c03af4f0e2b2b1c4b2887263a57c9e1ffc7bdca0d278d7abe6c369772e5b367bcb5bfa73507688cf3d90f99
-
Filesize
32KB
MD5a99944a9aa12c38d78582993a3cfe792
SHA1c20a7922cf677f1ab054be1971878822d080ae56
SHA256bd72af0028b2fba27bd7f6640dfd473834bb557f12f1ca3d6887493a4b8ab0ef
SHA51225d3490fa5823d4ffe4132db58450715891c11382c03af4f0e2b2b1c4b2887263a57c9e1ffc7bdca0d278d7abe6c369772e5b367bcb5bfa73507688cf3d90f99
-
Filesize
32KB
MD5a99944a9aa12c38d78582993a3cfe792
SHA1c20a7922cf677f1ab054be1971878822d080ae56
SHA256bd72af0028b2fba27bd7f6640dfd473834bb557f12f1ca3d6887493a4b8ab0ef
SHA51225d3490fa5823d4ffe4132db58450715891c11382c03af4f0e2b2b1c4b2887263a57c9e1ffc7bdca0d278d7abe6c369772e5b367bcb5bfa73507688cf3d90f99