Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2023 17:25

General

  • Target

    00a009c67d5aa0exe_JC.exe

  • Size

    42KB

  • MD5

    00a009c67d5aa070f4b7a2f816fe2acd

  • SHA1

    8913f3f46e5af3e1b92ce32f79fa20cadbe6acd2

  • SHA256

    bbdb5a05d67e63146a00f5f90ee39ffdf05a21fe1e2d71492b2795883522d28d

  • SHA512

    b36c2f24dfa8e1754154bfd7be7701b9cc3aefc46dd83181294edff3c9f9766071bd330978d72f924e6b4abd21ded16a0e1c02c7d63e3752ca87496577f3ac8f

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEq1xGb3yj:X6QFElP6n+gJQMOtEvwDpjB0mGbM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a009c67d5aa0exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\00a009c67d5aa0exe_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    3bacb62742218b6ac1d4ab859189f9ee

    SHA1

    362e6e456891f6efd99622de3fd0725b69f285df

    SHA256

    3897caf0e4722447559542a07f3159629e566e79d47a96807c7e9c305b971ff1

    SHA512

    cf826a130f23e746d448451c35166dcba794050a1e3966c01e4375480bd1c6ac8fab14cfc9a4f6b20ef5f8f1d10f8a359052deb8edfa8154134a6f11ed99242c

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    3bacb62742218b6ac1d4ab859189f9ee

    SHA1

    362e6e456891f6efd99622de3fd0725b69f285df

    SHA256

    3897caf0e4722447559542a07f3159629e566e79d47a96807c7e9c305b971ff1

    SHA512

    cf826a130f23e746d448451c35166dcba794050a1e3966c01e4375480bd1c6ac8fab14cfc9a4f6b20ef5f8f1d10f8a359052deb8edfa8154134a6f11ed99242c

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    3bacb62742218b6ac1d4ab859189f9ee

    SHA1

    362e6e456891f6efd99622de3fd0725b69f285df

    SHA256

    3897caf0e4722447559542a07f3159629e566e79d47a96807c7e9c305b971ff1

    SHA512

    cf826a130f23e746d448451c35166dcba794050a1e3966c01e4375480bd1c6ac8fab14cfc9a4f6b20ef5f8f1d10f8a359052deb8edfa8154134a6f11ed99242c

  • memory/4428-133-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4428-134-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4428-135-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/4932-151-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/4932-150-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB