Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 06:37
Static task
static1
Behavioral task
behavioral1
Sample
e23a710ef2f968exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e23a710ef2f968exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e23a710ef2f968exeexeexeex.exe
-
Size
32KB
-
MD5
e23a710ef2f968c1bf6df9c5a8f44a5e
-
SHA1
c720e63185271ed04c1cf61e792062f51478fc51
-
SHA256
2e1a700d403bf0361db6eb3b3721109d4508cf4ba8849d0cd3642296e05a2d32
-
SHA512
e53dd486510b5fe0a41f1d862392c1a3f2deab334f674c84ff93696f168206dcdc4c226ab6081629ecc2aef625f476ee3f6d3349cecefa53dba07065b61b4c77
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeW00shUQ:q0zizzOSxMOtEvwDpj/0dh7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation e23a710ef2f968exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 3740 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3740 2992 e23a710ef2f968exeexeexeex.exe 86 PID 2992 wrote to memory of 3740 2992 e23a710ef2f968exeexeexeex.exe 86 PID 2992 wrote to memory of 3740 2992 e23a710ef2f968exeexeexeex.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e23a710ef2f968exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e23a710ef2f968exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5102c3616b3b25cde3225c854b3edbcdc
SHA162263127f836df2586d8cc755fdf7952c8748976
SHA256f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3
SHA512bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219
-
Filesize
32KB
MD5102c3616b3b25cde3225c854b3edbcdc
SHA162263127f836df2586d8cc755fdf7952c8748976
SHA256f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3
SHA512bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219
-
Filesize
32KB
MD5102c3616b3b25cde3225c854b3edbcdc
SHA162263127f836df2586d8cc755fdf7952c8748976
SHA256f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3
SHA512bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219