Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 07:38
Behavioral task
behavioral1
Sample
ea0df7468e8d41exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
ea0df7468e8d41exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ea0df7468e8d41exeexeexeex.exe
-
Size
70KB
-
MD5
ea0df7468e8d41d19ed5cc398711e344
-
SHA1
352d0851678ebf6fb0569e04386b62beaa90531d
-
SHA256
7fe0b154de530950060dd5066d6919cab1989fe57c60f46e0a9050393c38a6f3
-
SHA512
5e15ffe736e24899d10a8d2f465553c8be432c88b83b38dc1d15008bb1202fde8b938bf931aa573943a6915676f0cdb7fe37b301c9c3fe87c8822d3451da745b
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzbTP:1nK6a+qdOOtEvwDpjK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation ea0df7468e8d41exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 372 asih.exe -
resource yara_rule behavioral2/memory/4832-136-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x0006000000023233-145.dat upx behavioral2/files/0x0006000000023233-147.dat upx behavioral2/files/0x0006000000023233-148.dat upx behavioral2/memory/372-156-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 372 4832 ea0df7468e8d41exeexeexeex.exe 86 PID 4832 wrote to memory of 372 4832 ea0df7468e8d41exeexeexeex.exe 86 PID 4832 wrote to memory of 372 4832 ea0df7468e8d41exeexeexeex.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea0df7468e8d41exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ea0df7468e8d41exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5828c1f0161d6b07e1f82d48e95cb5214
SHA1ef1dc342b963581038f9d9a4aece15dc7ff94fed
SHA25686f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805
SHA5128938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b
-
Filesize
70KB
MD5828c1f0161d6b07e1f82d48e95cb5214
SHA1ef1dc342b963581038f9d9a4aece15dc7ff94fed
SHA25686f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805
SHA5128938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b
-
Filesize
70KB
MD5828c1f0161d6b07e1f82d48e95cb5214
SHA1ef1dc342b963581038f9d9a4aece15dc7ff94fed
SHA25686f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805
SHA5128938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b