Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
c1448bb880d12cexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
c1448bb880d12cexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
c1448bb880d12cexeexeexeex.exe
-
Size
36KB
-
MD5
c1448bb880d12c35c70ffa0eae29a310
-
SHA1
fe9d3a62a81f0f3ba5186f62514bff17881a1e6c
-
SHA256
a7fb1bea9de54be276232abf750b5f96ee700c1a1902dc702f436448eb91be32
-
SHA512
237cd24780897e24f96dff062ecfb19f867a6300492f5bd64a098baa4ca613192bfb3eb7437ddac6bde251d6a19a8424240dc8565317411efdc25e25407f3824
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjej4AYsqSh+DETkejls9l:q0zizzOSxMOtEvwDpjC39+D+5Zy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation c1448bb880d12cexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 516 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1244 wrote to memory of 516 1244 c1448bb880d12cexeexeexeex.exe 85 PID 1244 wrote to memory of 516 1244 c1448bb880d12cexeexeexeex.exe 85 PID 1244 wrote to memory of 516 1244 c1448bb880d12cexeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1448bb880d12cexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\c1448bb880d12cexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b5340dc8b67ce9ac561edad043d892bb
SHA12e51a42b74988a71ebbc68daf43f6747f9e4c326
SHA256b63e2f971720d4b191a8a33e11726dc4cee265d89810a630aaca1d606e582270
SHA512763336de73780280f040e3f8e2fa1b548f797ae119b0f6b004ee486dd9f8184e6486046e089621fbf9443a2eb93650c270489053c8719d8ee344d2ba993ba27a
-
Filesize
36KB
MD5b5340dc8b67ce9ac561edad043d892bb
SHA12e51a42b74988a71ebbc68daf43f6747f9e4c326
SHA256b63e2f971720d4b191a8a33e11726dc4cee265d89810a630aaca1d606e582270
SHA512763336de73780280f040e3f8e2fa1b548f797ae119b0f6b004ee486dd9f8184e6486046e089621fbf9443a2eb93650c270489053c8719d8ee344d2ba993ba27a
-
Filesize
36KB
MD5b5340dc8b67ce9ac561edad043d892bb
SHA12e51a42b74988a71ebbc68daf43f6747f9e4c326
SHA256b63e2f971720d4b191a8a33e11726dc4cee265d89810a630aaca1d606e582270
SHA512763336de73780280f040e3f8e2fa1b548f797ae119b0f6b004ee486dd9f8184e6486046e089621fbf9443a2eb93650c270489053c8719d8ee344d2ba993ba27a