Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2023 18:10
Static task
static1
Behavioral task
behavioral1
Sample
d8bec3f923f1c9exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d8bec3f923f1c9exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
d8bec3f923f1c9exeexeexeex.exe
-
Size
29KB
-
MD5
d8bec3f923f1c9c9c783049f38124a50
-
SHA1
d612aebbd96712e8dacbac1dd199fa97a75bc2ff
-
SHA256
c5571b9443ad68baca654b5607b6b6db7c576bea310716b274fd3287dbfa90ec
-
SHA512
f3e754549dddea955d74b1ac817543ca09b3828cd0ddd3c2c1b063c5418592f94a9066430596b4b50430b6021bf06d6ff5e78911460f1a717f92022f0132a757
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUZ0psObGqWBv0dOeFL:bA74zYcgT/Ekd0ryfjeRtBsdOeFL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation d8bec3f923f1c9exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 720 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4224 wrote to memory of 720 4224 d8bec3f923f1c9exeexeexeex.exe 83 PID 4224 wrote to memory of 720 4224 d8bec3f923f1c9exeexeexeex.exe 83 PID 4224 wrote to memory of 720 4224 d8bec3f923f1c9exeexeexeex.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8bec3f923f1c9exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\d8bec3f923f1c9exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD595784d0ff61138d80d396d11768a60f4
SHA1d3b064b4f446a4f36109f757dd0e05ff2d4e9586
SHA25694d6edb260bdbc25d861a0c3abdfa32c664e93867c6187300e09ca5d1a953d19
SHA512467a0afca71363b92ca685b53a3c291539104e9ee240a214585fd73e65beb5ddc2a34ddd28f0ea84272ab29b50370bf62e94605803e97b2abe30a223425fa395
-
Filesize
30KB
MD595784d0ff61138d80d396d11768a60f4
SHA1d3b064b4f446a4f36109f757dd0e05ff2d4e9586
SHA25694d6edb260bdbc25d861a0c3abdfa32c664e93867c6187300e09ca5d1a953d19
SHA512467a0afca71363b92ca685b53a3c291539104e9ee240a214585fd73e65beb5ddc2a34ddd28f0ea84272ab29b50370bf62e94605803e97b2abe30a223425fa395
-
Filesize
30KB
MD595784d0ff61138d80d396d11768a60f4
SHA1d3b064b4f446a4f36109f757dd0e05ff2d4e9586
SHA25694d6edb260bdbc25d861a0c3abdfa32c664e93867c6187300e09ca5d1a953d19
SHA512467a0afca71363b92ca685b53a3c291539104e9ee240a214585fd73e65beb5ddc2a34ddd28f0ea84272ab29b50370bf62e94605803e97b2abe30a223425fa395