Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 06:32
Behavioral task
behavioral1
Sample
e15c2129c46df2exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e15c2129c46df2exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e15c2129c46df2exeexeexeex.exe
-
Size
79KB
-
MD5
e15c2129c46df250b9f3c7fc832c5297
-
SHA1
16d66f45ea35af823da47ada49fee5864ecaa221
-
SHA256
85e302f89d622e17077d07e412a6135ccac24009f44c7fe6e68fd92c797b5fda
-
SHA512
a400f9f2f49b70bd1c0f449443c1296b6b263d4df6b6b95ebc9a6730c7a71684c6d937b3c8f137e661ab62d14ad2a03fdd67c056a61abc74d184577e3c8b215e
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUT9:1nK6a+qdOOtEvwDpjO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation e15c2129c46df2exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 asih.exe -
resource yara_rule behavioral2/memory/1896-134-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x000600000002321f-145.dat upx behavioral2/files/0x000600000002321f-147.dat upx behavioral2/files/0x000600000002321f-148.dat upx behavioral2/memory/1604-156-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1604 1896 e15c2129c46df2exeexeexeex.exe 86 PID 1896 wrote to memory of 1604 1896 e15c2129c46df2exeexeexeex.exe 86 PID 1896 wrote to memory of 1604 1896 e15c2129c46df2exeexeexeex.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15c2129c46df2exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e15c2129c46df2exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5bb110d782bb0548f53aae9818d242469
SHA1a253333fa9a3b7da93b5278e6ac181a418450103
SHA2562af77962fc7e2b95a0c8e75b2cddfd0227808cd15ed8539131c0d10da37c1322
SHA51211f9c52e6392fc2839c466c22d13cbd182f3c141af2420270d0f658d349e50213f2807ffcbe6baf1f749322608f6bf548f45faf56888cc9a7cadd0fa74f18e49
-
Filesize
80KB
MD5bb110d782bb0548f53aae9818d242469
SHA1a253333fa9a3b7da93b5278e6ac181a418450103
SHA2562af77962fc7e2b95a0c8e75b2cddfd0227808cd15ed8539131c0d10da37c1322
SHA51211f9c52e6392fc2839c466c22d13cbd182f3c141af2420270d0f658d349e50213f2807ffcbe6baf1f749322608f6bf548f45faf56888cc9a7cadd0fa74f18e49
-
Filesize
80KB
MD5bb110d782bb0548f53aae9818d242469
SHA1a253333fa9a3b7da93b5278e6ac181a418450103
SHA2562af77962fc7e2b95a0c8e75b2cddfd0227808cd15ed8539131c0d10da37c1322
SHA51211f9c52e6392fc2839c466c22d13cbd182f3c141af2420270d0f658d349e50213f2807ffcbe6baf1f749322608f6bf548f45faf56888cc9a7cadd0fa74f18e49