Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 07:56
Behavioral task
behavioral1
Sample
9f03bc7fd7768bexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9f03bc7fd7768bexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9f03bc7fd7768bexeexeexeex.exe
-
Size
64KB
-
MD5
9f03bc7fd7768b1a6c13185053022a39
-
SHA1
678384e6a927a0f1a0f117d5230546749aac2a58
-
SHA256
0de42576c59bd44b608f61a524bc1e9fbfa3eb41b1add26b1b810046f889b427
-
SHA512
90a4623edb7c2e79542d6c4a5e14dfdc3e0e433fbe7c4f963e6736d83646934b2aa3a5510b510f14db5de4705f2ac06e0d89beca7e4c4e8f64dd1694946ce06e
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAh5gD:z6a+CdOOtEvwDpjQJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 9f03bc7fd7768bexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4768 asih.exe -
resource yara_rule behavioral2/memory/1516-133-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x00060000000231e5-145.dat upx behavioral2/files/0x00060000000231e5-147.dat upx behavioral2/files/0x00060000000231e5-148.dat upx behavioral2/memory/1516-149-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4768-157-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4768 1516 9f03bc7fd7768bexeexeexeex.exe 84 PID 1516 wrote to memory of 4768 1516 9f03bc7fd7768bexeexeexeex.exe 84 PID 1516 wrote to memory of 4768 1516 9f03bc7fd7768bexeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f03bc7fd7768bexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9f03bc7fd7768bexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5eb1bb69227f5279fe1c82140013a2d4f
SHA17262ddec4a7cc260d3aec678e548a25df2d23d5e
SHA256a47eb50725f2cda2765cb12115a704bd2f4a790fd5784995a5882b577a8ae838
SHA512b324996ac8a734ee2a1d87a5509977d2b41cf290d95561f3da48853ce79f1203131d0a9d1fcdd178063b5309ec9e6d76e96b9eb2f5e9866bc4cee2d8dc111872
-
Filesize
64KB
MD5eb1bb69227f5279fe1c82140013a2d4f
SHA17262ddec4a7cc260d3aec678e548a25df2d23d5e
SHA256a47eb50725f2cda2765cb12115a704bd2f4a790fd5784995a5882b577a8ae838
SHA512b324996ac8a734ee2a1d87a5509977d2b41cf290d95561f3da48853ce79f1203131d0a9d1fcdd178063b5309ec9e6d76e96b9eb2f5e9866bc4cee2d8dc111872
-
Filesize
64KB
MD5eb1bb69227f5279fe1c82140013a2d4f
SHA17262ddec4a7cc260d3aec678e548a25df2d23d5e
SHA256a47eb50725f2cda2765cb12115a704bd2f4a790fd5784995a5882b577a8ae838
SHA512b324996ac8a734ee2a1d87a5509977d2b41cf290d95561f3da48853ce79f1203131d0a9d1fcdd178063b5309ec9e6d76e96b9eb2f5e9866bc4cee2d8dc111872