Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2023, 13:48

General

  • Target

    c1448bb880d12cexeexeexeex.exe

  • Size

    36KB

  • MD5

    c1448bb880d12c35c70ffa0eae29a310

  • SHA1

    fe9d3a62a81f0f3ba5186f62514bff17881a1e6c

  • SHA256

    a7fb1bea9de54be276232abf750b5f96ee700c1a1902dc702f436448eb91be32

  • SHA512

    237cd24780897e24f96dff062ecfb19f867a6300492f5bd64a098baa4ca613192bfb3eb7437ddac6bde251d6a19a8424240dc8565317411efdc25e25407f3824

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjej4AYsqSh+DETkejls9l:q0zizzOSxMOtEvwDpjC39+D+5Zy

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1448bb880d12cexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\c1448bb880d12cexeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    36KB

    MD5

    b5340dc8b67ce9ac561edad043d892bb

    SHA1

    2e51a42b74988a71ebbc68daf43f6747f9e4c326

    SHA256

    b63e2f971720d4b191a8a33e11726dc4cee265d89810a630aaca1d606e582270

    SHA512

    763336de73780280f040e3f8e2fa1b548f797ae119b0f6b004ee486dd9f8184e6486046e089621fbf9443a2eb93650c270489053c8719d8ee344d2ba993ba27a

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    36KB

    MD5

    b5340dc8b67ce9ac561edad043d892bb

    SHA1

    2e51a42b74988a71ebbc68daf43f6747f9e4c326

    SHA256

    b63e2f971720d4b191a8a33e11726dc4cee265d89810a630aaca1d606e582270

    SHA512

    763336de73780280f040e3f8e2fa1b548f797ae119b0f6b004ee486dd9f8184e6486046e089621fbf9443a2eb93650c270489053c8719d8ee344d2ba993ba27a

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    36KB

    MD5

    b5340dc8b67ce9ac561edad043d892bb

    SHA1

    2e51a42b74988a71ebbc68daf43f6747f9e4c326

    SHA256

    b63e2f971720d4b191a8a33e11726dc4cee265d89810a630aaca1d606e582270

    SHA512

    763336de73780280f040e3f8e2fa1b548f797ae119b0f6b004ee486dd9f8184e6486046e089621fbf9443a2eb93650c270489053c8719d8ee344d2ba993ba27a

  • memory/516-155-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1244-133-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB

  • memory/1244-134-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/1244-141-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB