Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2023 06:37

General

  • Target

    e23a710ef2f968exeexeexeex.exe

  • Size

    32KB

  • MD5

    e23a710ef2f968c1bf6df9c5a8f44a5e

  • SHA1

    c720e63185271ed04c1cf61e792062f51478fc51

  • SHA256

    2e1a700d403bf0361db6eb3b3721109d4508cf4ba8849d0cd3642296e05a2d32

  • SHA512

    e53dd486510b5fe0a41f1d862392c1a3f2deab334f674c84ff93696f168206dcdc4c226ab6081629ecc2aef625f476ee3f6d3349cecefa53dba07065b61b4c77

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeW00shUQ:q0zizzOSxMOtEvwDpj/0dh7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e23a710ef2f968exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\e23a710ef2f968exeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    32KB

    MD5

    102c3616b3b25cde3225c854b3edbcdc

    SHA1

    62263127f836df2586d8cc755fdf7952c8748976

    SHA256

    f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3

    SHA512

    bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    32KB

    MD5

    102c3616b3b25cde3225c854b3edbcdc

    SHA1

    62263127f836df2586d8cc755fdf7952c8748976

    SHA256

    f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3

    SHA512

    bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    32KB

    MD5

    102c3616b3b25cde3225c854b3edbcdc

    SHA1

    62263127f836df2586d8cc755fdf7952c8748976

    SHA256

    f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3

    SHA512

    bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219

  • memory/2992-133-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2992-134-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/2992-141-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3740-151-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/3740-157-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB