Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 19:45
Behavioral task
behavioral1
Sample
bf420fa90658beexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bf420fa90658beexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
bf420fa90658beexeexeexeex.exe
-
Size
43KB
-
MD5
bf420fa90658bed18451c79f5a6189b3
-
SHA1
4f37928114e133d69a3dab9379eb1b60aa55b0cf
-
SHA256
b3f1c5f4d840ba14b6ebca34b232643487b7f5922e50a36518b5d61f745a7e2e
-
SHA512
660b539728ce265aaf25e75d4c2f99962fc43f67036c058719bb57474b67ffb1915370dcf0f71290a029ce2093817f6613a33b4ac6a112021534bccef2582716
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzfm5oU3tu8/Y:qUmnpomddpMOtEvwDpjjaYaFAh5Nw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation bf420fa90658beexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4540 asih.exe -
resource yara_rule behavioral2/memory/2708-133-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x0008000000023228-145.dat upx behavioral2/files/0x0008000000023228-147.dat upx behavioral2/files/0x0008000000023228-148.dat upx behavioral2/memory/2708-149-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/4540-153-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4540 2708 bf420fa90658beexeexeexeex.exe 85 PID 2708 wrote to memory of 4540 2708 bf420fa90658beexeexeexeex.exe 85 PID 2708 wrote to memory of 4540 2708 bf420fa90658beexeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf420fa90658beexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\bf420fa90658beexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5f21834b713a7e2b5debc20f6f6233346
SHA14277e11c1c7b947a10e12a616d3e0e6d402bc60d
SHA256c2c102513497aa9913be97c616f958d905a5e227d0ed4cd8780c80ea129a1f99
SHA512a895e52b69c824fa3b3b2575bb5c30407aef92dfc4374df612f55a891a0c0084db247427b867d27c6677ecdf2f5ef5bf93af6a114f0c2a91e1d1b734d8e27fc4
-
Filesize
43KB
MD5f21834b713a7e2b5debc20f6f6233346
SHA14277e11c1c7b947a10e12a616d3e0e6d402bc60d
SHA256c2c102513497aa9913be97c616f958d905a5e227d0ed4cd8780c80ea129a1f99
SHA512a895e52b69c824fa3b3b2575bb5c30407aef92dfc4374df612f55a891a0c0084db247427b867d27c6677ecdf2f5ef5bf93af6a114f0c2a91e1d1b734d8e27fc4
-
Filesize
43KB
MD5f21834b713a7e2b5debc20f6f6233346
SHA14277e11c1c7b947a10e12a616d3e0e6d402bc60d
SHA256c2c102513497aa9913be97c616f958d905a5e227d0ed4cd8780c80ea129a1f99
SHA512a895e52b69c824fa3b3b2575bb5c30407aef92dfc4374df612f55a891a0c0084db247427b867d27c6677ecdf2f5ef5bf93af6a114f0c2a91e1d1b734d8e27fc4