Analysis

  • max time kernel
    140s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 17:31

General

  • Target

    91b4791319fb2fexeexeexeex.exe

  • Size

    39KB

  • MD5

    91b4791319fb2f4cc243aa69448d1834

  • SHA1

    3a9a765ffc0b07460a4153884af247d5fac9a9ce

  • SHA256

    8ae0664b432397b5d141a8d1dca57ce582c826a89d00c09d75943355e6ecc702

  • SHA512

    ee052546147d8e0bc6fb1aeb247cadbf4c06eb7066d51edaeac1ce3c77adf3eee92ce28d51de569c156f30c739af329876b5aa2da4753693815ef4534ff536b1

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaUfmZlQyEgDrBBfl:X6QFElP6n+gJQMOtEvwDpjBkfmbQyEgt

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91b4791319fb2fexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\91b4791319fb2fexeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    4abd8428040303546ff8b6d795cc9081

    SHA1

    f21ed875a0ebf7139b368baeae69f681c0909b63

    SHA256

    2aecf99e9c0a98dd5a095770b8212b858593986c93f86eaf9a6fd692399154f1

    SHA512

    8cd929d5286170293cc827350547c91e79e0644a415fa878e1f2b9d02d72c05fa9afe2d5fbf739cb7a3aca78a61f99cbafe105f8180b9a46abca13d828a5f5de

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    4abd8428040303546ff8b6d795cc9081

    SHA1

    f21ed875a0ebf7139b368baeae69f681c0909b63

    SHA256

    2aecf99e9c0a98dd5a095770b8212b858593986c93f86eaf9a6fd692399154f1

    SHA512

    8cd929d5286170293cc827350547c91e79e0644a415fa878e1f2b9d02d72c05fa9afe2d5fbf739cb7a3aca78a61f99cbafe105f8180b9a46abca13d828a5f5de

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    4abd8428040303546ff8b6d795cc9081

    SHA1

    f21ed875a0ebf7139b368baeae69f681c0909b63

    SHA256

    2aecf99e9c0a98dd5a095770b8212b858593986c93f86eaf9a6fd692399154f1

    SHA512

    8cd929d5286170293cc827350547c91e79e0644a415fa878e1f2b9d02d72c05fa9afe2d5fbf739cb7a3aca78a61f99cbafe105f8180b9a46abca13d828a5f5de

  • memory/3744-133-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3744-134-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4192-149-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB