Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
971431b77138daexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
971431b77138daexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
971431b77138daexeexeexeex.exe
-
Size
55KB
-
MD5
971431b77138da0be547e9302ddc00c1
-
SHA1
0b4f2480d638c7eae3745f0d0af3ab1cdb2644b3
-
SHA256
1a9fbfa77d501ec404894160a7bcb20084690650b8a065c4fb753251a8a03f54
-
SHA512
b86b9b1680a3a40bcb49ec73e7e3758a45db8436fec45238d837c9f7b152975f29f766578e46609ddfa3aee613ef127e865c3e2781ef7066cd7d1fdfe80a7d59
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLEofcw:X6a+SOtEvwDpjBrOL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation 971431b77138daexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3620 wrote to memory of 2868 3620 971431b77138daexeexeexeex.exe 84 PID 3620 wrote to memory of 2868 3620 971431b77138daexeexeexeex.exe 84 PID 3620 wrote to memory of 2868 3620 971431b77138daexeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\971431b77138daexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\971431b77138daexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5a36bf0883eb79d61bcde78250e225ad9
SHA11961e442e0eb967bbab0576c9d81ec0c3aee6e15
SHA25606ddf757142da77a917b8959a71219712e9c0b10a52a1b9115964c2a39b78bb5
SHA51230d766644c255715e67527daebc0d0b3e1f0d55b762bf865c946dfccd850adc93002b72b43c6b7de6ba3a79d337ab7445e47550c3358d1e568101f9cd490fbfa
-
Filesize
55KB
MD5a36bf0883eb79d61bcde78250e225ad9
SHA11961e442e0eb967bbab0576c9d81ec0c3aee6e15
SHA25606ddf757142da77a917b8959a71219712e9c0b10a52a1b9115964c2a39b78bb5
SHA51230d766644c255715e67527daebc0d0b3e1f0d55b762bf865c946dfccd850adc93002b72b43c6b7de6ba3a79d337ab7445e47550c3358d1e568101f9cd490fbfa
-
Filesize
55KB
MD5a36bf0883eb79d61bcde78250e225ad9
SHA11961e442e0eb967bbab0576c9d81ec0c3aee6e15
SHA25606ddf757142da77a917b8959a71219712e9c0b10a52a1b9115964c2a39b78bb5
SHA51230d766644c255715e67527daebc0d0b3e1f0d55b762bf865c946dfccd850adc93002b72b43c6b7de6ba3a79d337ab7445e47550c3358d1e568101f9cd490fbfa