Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 09:26
Behavioral task
behavioral1
Sample
a9fb329dd493dcexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
a9fb329dd493dcexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
a9fb329dd493dcexeexeexeex.exe
-
Size
139KB
-
MD5
a9fb329dd493dc2e0cf5b56a3459825a
-
SHA1
85800c24779f7165cd7fd562954e97c2cad77458
-
SHA256
19c80d24b7410a444081f2110c0f6354e079a9a5f3814f1cdb7bd8805432f82d
-
SHA512
9090a1022d670d6a32fbc6ab22cd619d514b775c3f1b1e9efdbdcb2e13854a6eee191c735cdedf2ce81b7c50b592405342d10942121f323ea33674c0895962e6
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GjZL:z6a+CdOOtEvwDpjczg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation a9fb329dd493dcexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 asih.exe -
resource yara_rule behavioral2/memory/2680-134-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000700000002321f-145.dat upx behavioral2/files/0x000700000002321f-147.dat upx behavioral2/files/0x000700000002321f-148.dat upx behavioral2/memory/1996-156-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1996 2680 a9fb329dd493dcexeexeexeex.exe 84 PID 2680 wrote to memory of 1996 2680 a9fb329dd493dcexeexeexeex.exe 84 PID 2680 wrote to memory of 1996 2680 a9fb329dd493dcexeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9fb329dd493dcexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\a9fb329dd493dcexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5f0c1c3527f229039abd2f846cf628757
SHA1f7203e5da6e8ea6597ac7b6c7c57099d8cf02301
SHA256511c7d5398d6f27fff651f5ad3bda7096861900cf830a677db2e6553ed174ad6
SHA51287d8ffc42a30dd20aae6d78dbfd708102e0165fb4e1fe7864a13901bcb10aa18b930951da3bc535f2777526c9cfa2b8237b0fb046b7ab971b140b1c8ebfd551d
-
Filesize
139KB
MD5f0c1c3527f229039abd2f846cf628757
SHA1f7203e5da6e8ea6597ac7b6c7c57099d8cf02301
SHA256511c7d5398d6f27fff651f5ad3bda7096861900cf830a677db2e6553ed174ad6
SHA51287d8ffc42a30dd20aae6d78dbfd708102e0165fb4e1fe7864a13901bcb10aa18b930951da3bc535f2777526c9cfa2b8237b0fb046b7ab971b140b1c8ebfd551d
-
Filesize
139KB
MD5f0c1c3527f229039abd2f846cf628757
SHA1f7203e5da6e8ea6597ac7b6c7c57099d8cf02301
SHA256511c7d5398d6f27fff651f5ad3bda7096861900cf830a677db2e6553ed174ad6
SHA51287d8ffc42a30dd20aae6d78dbfd708102e0165fb4e1fe7864a13901bcb10aa18b930951da3bc535f2777526c9cfa2b8237b0fb046b7ab971b140b1c8ebfd551d