Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
b6f46b6955847aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b6f46b6955847aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
b6f46b6955847aexeexeexeex.exe
-
Size
35KB
-
MD5
b6f46b6955847a61bd707f5bcf83032c
-
SHA1
4f8babd3e38375a97d4db5230eccfad571623e30
-
SHA256
8a0aeffc68476d1348e0b40efc7eda8982e3bfb7947d6b63761351b25d2d9fc2
-
SHA512
d64fbd0f9c46c2e114a15ffa0a5e31708a968c4924808e5dd2c9d650c5f3c4e7d181a2776c4161e612cf5addc31c4e896053bef71bc4be019f1587ae8a733b92
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72DxLq:bgX4zYcgTEu6QOaryfjqDlC76Lq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation b6f46b6955847aexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 776 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 776 2896 b6f46b6955847aexeexeexeex.exe 84 PID 2896 wrote to memory of 776 2896 b6f46b6955847aexeexeexeex.exe 84 PID 2896 wrote to memory of 776 2896 b6f46b6955847aexeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f46b6955847aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b6f46b6955847aexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD541f22709a612f07cd895f688eeb4a642
SHA1acf3dc49420c5cc5e8756abf6991cacadf062e48
SHA2560dc10db63bfe5b9015f70a2450eb5cbe9f5f712984cd37b9af277c15c7419d8a
SHA512abfe8560ee0f6585c35fe9eeb5e2f01d2fa59c91ba7f295410edfea5398ff1135c168b9bf2e4f73c04839f486da1ccf456c9b7ca8c67bac4f2821a685d71be40
-
Filesize
35KB
MD541f22709a612f07cd895f688eeb4a642
SHA1acf3dc49420c5cc5e8756abf6991cacadf062e48
SHA2560dc10db63bfe5b9015f70a2450eb5cbe9f5f712984cd37b9af277c15c7419d8a
SHA512abfe8560ee0f6585c35fe9eeb5e2f01d2fa59c91ba7f295410edfea5398ff1135c168b9bf2e4f73c04839f486da1ccf456c9b7ca8c67bac4f2821a685d71be40
-
Filesize
35KB
MD541f22709a612f07cd895f688eeb4a642
SHA1acf3dc49420c5cc5e8756abf6991cacadf062e48
SHA2560dc10db63bfe5b9015f70a2450eb5cbe9f5f712984cd37b9af277c15c7419d8a
SHA512abfe8560ee0f6585c35fe9eeb5e2f01d2fa59c91ba7f295410edfea5398ff1135c168b9bf2e4f73c04839f486da1ccf456c9b7ca8c67bac4f2821a685d71be40