Analysis

  • max time kernel
    149s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 16:27

General

  • Target

    8192d088d86e04exeexeexeex.exe

  • Size

    79KB

  • MD5

    8192d088d86e04c9e466c6488044f21e

  • SHA1

    2567b3ec224ee12e77a8db151ebd29f5ea56763a

  • SHA256

    68d2184a25dd643afca3cc438bdc898e1cf8257e051c8e589900beb99ed91f1b

  • SHA512

    2e2d648911794e063fec5644c42f3b0a4882379ad26ee91607105b22480868b31fdcab67d97356cc19defa7f3b2bc1851a1747c3dbfa2c655c86fb700be738db

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUTd:1nK6a+qdOOtEvwDpjG

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8192d088d86e04exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\8192d088d86e04exeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4916
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    80KB

    MD5

    6143dfa91e439543444eae2922b334ad

    SHA1

    d6a8ac226f253bb29aeaa23a4c72b3541d8711b1

    SHA256

    fdb00e2ee339f63c9d2e1a503ccec95f6e540381a9ad808d38b8cc5b022cf6ba

    SHA512

    1686059f526ae339d0003dc9baf8cf00a920b84babf248a2b3c19c2c4413682993b6c6c264e68e9b2051febec570474e7307d5f1c794be19e87721b338cb485d

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    80KB

    MD5

    6143dfa91e439543444eae2922b334ad

    SHA1

    d6a8ac226f253bb29aeaa23a4c72b3541d8711b1

    SHA256

    fdb00e2ee339f63c9d2e1a503ccec95f6e540381a9ad808d38b8cc5b022cf6ba

    SHA512

    1686059f526ae339d0003dc9baf8cf00a920b84babf248a2b3c19c2c4413682993b6c6c264e68e9b2051febec570474e7307d5f1c794be19e87721b338cb485d

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    80KB

    MD5

    6143dfa91e439543444eae2922b334ad

    SHA1

    d6a8ac226f253bb29aeaa23a4c72b3541d8711b1

    SHA256

    fdb00e2ee339f63c9d2e1a503ccec95f6e540381a9ad808d38b8cc5b022cf6ba

    SHA512

    1686059f526ae339d0003dc9baf8cf00a920b84babf248a2b3c19c2c4413682993b6c6c264e68e9b2051febec570474e7307d5f1c794be19e87721b338cb485d

  • memory/3084-133-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/3084-134-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB

  • memory/3084-135-0x0000000002220000-0x0000000002226000-memory.dmp

    Filesize

    24KB

  • memory/3084-154-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/4916-150-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/4916-157-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB