Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 17:45

General

  • Target

    971431b77138daexeexeexeex.exe

  • Size

    55KB

  • MD5

    971431b77138da0be547e9302ddc00c1

  • SHA1

    0b4f2480d638c7eae3745f0d0af3ab1cdb2644b3

  • SHA256

    1a9fbfa77d501ec404894160a7bcb20084690650b8a065c4fb753251a8a03f54

  • SHA512

    b86b9b1680a3a40bcb49ec73e7e3758a45db8436fec45238d837c9f7b152975f29f766578e46609ddfa3aee613ef127e865c3e2781ef7066cd7d1fdfe80a7d59

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLEofcw:X6a+SOtEvwDpjBrOL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\971431b77138daexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\971431b77138daexeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2868

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          55KB

          MD5

          a36bf0883eb79d61bcde78250e225ad9

          SHA1

          1961e442e0eb967bbab0576c9d81ec0c3aee6e15

          SHA256

          06ddf757142da77a917b8959a71219712e9c0b10a52a1b9115964c2a39b78bb5

          SHA512

          30d766644c255715e67527daebc0d0b3e1f0d55b762bf865c946dfccd850adc93002b72b43c6b7de6ba3a79d337ab7445e47550c3358d1e568101f9cd490fbfa

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          55KB

          MD5

          a36bf0883eb79d61bcde78250e225ad9

          SHA1

          1961e442e0eb967bbab0576c9d81ec0c3aee6e15

          SHA256

          06ddf757142da77a917b8959a71219712e9c0b10a52a1b9115964c2a39b78bb5

          SHA512

          30d766644c255715e67527daebc0d0b3e1f0d55b762bf865c946dfccd850adc93002b72b43c6b7de6ba3a79d337ab7445e47550c3358d1e568101f9cd490fbfa

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          55KB

          MD5

          a36bf0883eb79d61bcde78250e225ad9

          SHA1

          1961e442e0eb967bbab0576c9d81ec0c3aee6e15

          SHA256

          06ddf757142da77a917b8959a71219712e9c0b10a52a1b9115964c2a39b78bb5

          SHA512

          30d766644c255715e67527daebc0d0b3e1f0d55b762bf865c946dfccd850adc93002b72b43c6b7de6ba3a79d337ab7445e47550c3358d1e568101f9cd490fbfa

        • memory/2868-149-0x00000000007C0000-0x00000000007C6000-memory.dmp

          Filesize

          24KB

        • memory/3620-133-0x00000000005D0000-0x00000000005D6000-memory.dmp

          Filesize

          24KB

        • memory/3620-134-0x00000000005F0000-0x00000000005F6000-memory.dmp

          Filesize

          24KB