Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
f561c5aff89398exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
f561c5aff89398exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
f561c5aff89398exeexeexeex.exe
-
Size
57KB
-
MD5
f561c5aff89398200508a2ce2eab6f0a
-
SHA1
2b07efc9961e48d57efa571a604fb48f02216073
-
SHA256
fb2c282ead81377e6cad007a4de7a7422a9b183c0657723b18a24f99e64e06ae
-
SHA512
a2b4c87ead405221869941464950d62bfc2e9fd64daf42441cd83505b81ca7e36fd4bf0178f10503b00164708b80720e4e3f2630d159d0a8c2b3b6eba1637825
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccCKdulcTPsf6:V6a+pOtEvwDpjv9T
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation f561c5aff89398exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 2396 4368 f561c5aff89398exeexeexeex.exe 86 PID 4368 wrote to memory of 2396 4368 f561c5aff89398exeexeexeex.exe 86 PID 4368 wrote to memory of 2396 4368 f561c5aff89398exeexeexeex.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f561c5aff89398exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\f561c5aff89398exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5e5f4b27c31bf862e3f9a87738a3622ae
SHA127edeec5d44aad4673a4cbd1bbce71105e30de4f
SHA256bf1bdab00e4f9d2bb8095c86f6ba723dcf0b8d717f9ae5d584d29c8c44dbf65f
SHA51203706a114b4ad80eb102cda624db8a3495bfc8022fe7a68f52ca78850fab07c918dd819d127162603ab0a05fb0ea273d2fd6687e8a78ba6e743c5b8d62abb5b7
-
Filesize
57KB
MD5e5f4b27c31bf862e3f9a87738a3622ae
SHA127edeec5d44aad4673a4cbd1bbce71105e30de4f
SHA256bf1bdab00e4f9d2bb8095c86f6ba723dcf0b8d717f9ae5d584d29c8c44dbf65f
SHA51203706a114b4ad80eb102cda624db8a3495bfc8022fe7a68f52ca78850fab07c918dd819d127162603ab0a05fb0ea273d2fd6687e8a78ba6e743c5b8d62abb5b7
-
Filesize
57KB
MD5e5f4b27c31bf862e3f9a87738a3622ae
SHA127edeec5d44aad4673a4cbd1bbce71105e30de4f
SHA256bf1bdab00e4f9d2bb8095c86f6ba723dcf0b8d717f9ae5d584d29c8c44dbf65f
SHA51203706a114b4ad80eb102cda624db8a3495bfc8022fe7a68f52ca78850fab07c918dd819d127162603ab0a05fb0ea273d2fd6687e8a78ba6e743c5b8d62abb5b7