Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
91b4791319fb2fexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
91b4791319fb2fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
91b4791319fb2fexeexeexeex.exe
-
Size
39KB
-
MD5
91b4791319fb2f4cc243aa69448d1834
-
SHA1
3a9a765ffc0b07460a4153884af247d5fac9a9ce
-
SHA256
8ae0664b432397b5d141a8d1dca57ce582c826a89d00c09d75943355e6ecc702
-
SHA512
ee052546147d8e0bc6fb1aeb247cadbf4c06eb7066d51edaeac1ce3c77adf3eee92ce28d51de569c156f30c739af329876b5aa2da4753693815ef4534ff536b1
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaUfmZlQyEgDrBBfl:X6QFElP6n+gJQMOtEvwDpjBkfmbQyEgt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation 91b4791319fb2fexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4192 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3744 wrote to memory of 4192 3744 91b4791319fb2fexeexeexeex.exe 84 PID 3744 wrote to memory of 4192 3744 91b4791319fb2fexeexeexeex.exe 84 PID 3744 wrote to memory of 4192 3744 91b4791319fb2fexeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\91b4791319fb2fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\91b4791319fb2fexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD54abd8428040303546ff8b6d795cc9081
SHA1f21ed875a0ebf7139b368baeae69f681c0909b63
SHA2562aecf99e9c0a98dd5a095770b8212b858593986c93f86eaf9a6fd692399154f1
SHA5128cd929d5286170293cc827350547c91e79e0644a415fa878e1f2b9d02d72c05fa9afe2d5fbf739cb7a3aca78a61f99cbafe105f8180b9a46abca13d828a5f5de
-
Filesize
40KB
MD54abd8428040303546ff8b6d795cc9081
SHA1f21ed875a0ebf7139b368baeae69f681c0909b63
SHA2562aecf99e9c0a98dd5a095770b8212b858593986c93f86eaf9a6fd692399154f1
SHA5128cd929d5286170293cc827350547c91e79e0644a415fa878e1f2b9d02d72c05fa9afe2d5fbf739cb7a3aca78a61f99cbafe105f8180b9a46abca13d828a5f5de
-
Filesize
40KB
MD54abd8428040303546ff8b6d795cc9081
SHA1f21ed875a0ebf7139b368baeae69f681c0909b63
SHA2562aecf99e9c0a98dd5a095770b8212b858593986c93f86eaf9a6fd692399154f1
SHA5128cd929d5286170293cc827350547c91e79e0644a415fa878e1f2b9d02d72c05fa9afe2d5fbf739cb7a3aca78a61f99cbafe105f8180b9a46abca13d828a5f5de