Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 07:59
Static task
static1
Behavioral task
behavioral1
Sample
9f81ead4778625exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9f81ead4778625exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9f81ead4778625exeexeexeex.exe
-
Size
86KB
-
MD5
9f81ead47786254ce826c5112ecd0b26
-
SHA1
1e2397a5e1c7eb2d571c9d30559d2f119749743c
-
SHA256
8e6beef2716b8c37fb964e0460b52bf4320c115fd0da4cdbd8c169112205be54
-
SHA512
a4daa20fde8572d946e23917219f6bc6d2cf84f8a44e54298b9881a92119f2d78b8175021311022048057b378e384d629ee44d0048854c6ebbbea44fe00c5af4
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWi:V6a+pOtEvwDpjtD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation 9f81ead4778625exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 3972 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3408 wrote to memory of 3972 3408 9f81ead4778625exeexeexeex.exe 84 PID 3408 wrote to memory of 3972 3408 9f81ead4778625exeexeexeex.exe 84 PID 3408 wrote to memory of 3972 3408 9f81ead4778625exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f81ead4778625exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9f81ead4778625exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD566b886769c4724fa230d6e5eb19bdbcd
SHA1daf99554844949a14595a733a5e88c6eedb42efc
SHA25622534c5fe3ceed6bc75174d137bef3fa3aaa8547779d03b8750c3b66eb3d3936
SHA5123d47dd6a825b906b1e84da770a2bf34cf4c160296f2d5c795bf30037da7b55fbc6b4fe620d4d2be2fd41a6434d2bbef84763ee55f1b92008629a9c54fcfcdc84
-
Filesize
87KB
MD566b886769c4724fa230d6e5eb19bdbcd
SHA1daf99554844949a14595a733a5e88c6eedb42efc
SHA25622534c5fe3ceed6bc75174d137bef3fa3aaa8547779d03b8750c3b66eb3d3936
SHA5123d47dd6a825b906b1e84da770a2bf34cf4c160296f2d5c795bf30037da7b55fbc6b4fe620d4d2be2fd41a6434d2bbef84763ee55f1b92008629a9c54fcfcdc84
-
Filesize
87KB
MD566b886769c4724fa230d6e5eb19bdbcd
SHA1daf99554844949a14595a733a5e88c6eedb42efc
SHA25622534c5fe3ceed6bc75174d137bef3fa3aaa8547779d03b8750c3b66eb3d3936
SHA5123d47dd6a825b906b1e84da770a2bf34cf4c160296f2d5c795bf30037da7b55fbc6b4fe620d4d2be2fd41a6434d2bbef84763ee55f1b92008629a9c54fcfcdc84