Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 16:27
Behavioral task
behavioral1
Sample
8192d088d86e04exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8192d088d86e04exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8192d088d86e04exeexeexeex.exe
-
Size
79KB
-
MD5
8192d088d86e04c9e466c6488044f21e
-
SHA1
2567b3ec224ee12e77a8db151ebd29f5ea56763a
-
SHA256
68d2184a25dd643afca3cc438bdc898e1cf8257e051c8e589900beb99ed91f1b
-
SHA512
2e2d648911794e063fec5644c42f3b0a4882379ad26ee91607105b22480868b31fdcab67d97356cc19defa7f3b2bc1851a1747c3dbfa2c655c86fb700be738db
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUTd:1nK6a+qdOOtEvwDpjG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation 8192d088d86e04exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 asih.exe -
resource yara_rule behavioral2/memory/3084-133-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x00070000000231ed-145.dat upx behavioral2/files/0x00070000000231ed-147.dat upx behavioral2/files/0x00070000000231ed-148.dat upx behavioral2/memory/3084-154-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/memory/4916-157-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{E3AAD17A-F029-4CED-90B4-8AB1717EF462}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4916 3084 8192d088d86e04exeexeexeex.exe 79 PID 3084 wrote to memory of 4916 3084 8192d088d86e04exeexeexeex.exe 79 PID 3084 wrote to memory of 4916 3084 8192d088d86e04exeexeexeex.exe 79 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8192d088d86e04exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8192d088d86e04exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4916
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD56143dfa91e439543444eae2922b334ad
SHA1d6a8ac226f253bb29aeaa23a4c72b3541d8711b1
SHA256fdb00e2ee339f63c9d2e1a503ccec95f6e540381a9ad808d38b8cc5b022cf6ba
SHA5121686059f526ae339d0003dc9baf8cf00a920b84babf248a2b3c19c2c4413682993b6c6c264e68e9b2051febec570474e7307d5f1c794be19e87721b338cb485d
-
Filesize
80KB
MD56143dfa91e439543444eae2922b334ad
SHA1d6a8ac226f253bb29aeaa23a4c72b3541d8711b1
SHA256fdb00e2ee339f63c9d2e1a503ccec95f6e540381a9ad808d38b8cc5b022cf6ba
SHA5121686059f526ae339d0003dc9baf8cf00a920b84babf248a2b3c19c2c4413682993b6c6c264e68e9b2051febec570474e7307d5f1c794be19e87721b338cb485d
-
Filesize
80KB
MD56143dfa91e439543444eae2922b334ad
SHA1d6a8ac226f253bb29aeaa23a4c72b3541d8711b1
SHA256fdb00e2ee339f63c9d2e1a503ccec95f6e540381a9ad808d38b8cc5b022cf6ba
SHA5121686059f526ae339d0003dc9baf8cf00a920b84babf248a2b3c19c2c4413682993b6c6c264e68e9b2051febec570474e7307d5f1c794be19e87721b338cb485d