Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 17:25
Static task
static1
Behavioral task
behavioral1
Sample
00a009c67d5aa0exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
00a009c67d5aa0exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
00a009c67d5aa0exe_JC.exe
-
Size
42KB
-
MD5
00a009c67d5aa070f4b7a2f816fe2acd
-
SHA1
8913f3f46e5af3e1b92ce32f79fa20cadbe6acd2
-
SHA256
bbdb5a05d67e63146a00f5f90ee39ffdf05a21fe1e2d71492b2795883522d28d
-
SHA512
b36c2f24dfa8e1754154bfd7be7701b9cc3aefc46dd83181294edff3c9f9766071bd330978d72f924e6b4abd21ded16a0e1c02c7d63e3752ca87496577f3ac8f
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEq1xGb3yj:X6QFElP6n+gJQMOtEvwDpjB0mGbM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 00a009c67d5aa0exe_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4932 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4428 wrote to memory of 4932 4428 00a009c67d5aa0exe_JC.exe 85 PID 4428 wrote to memory of 4932 4428 00a009c67d5aa0exe_JC.exe 85 PID 4428 wrote to memory of 4932 4428 00a009c67d5aa0exe_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\00a009c67d5aa0exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\00a009c67d5aa0exe_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD53bacb62742218b6ac1d4ab859189f9ee
SHA1362e6e456891f6efd99622de3fd0725b69f285df
SHA2563897caf0e4722447559542a07f3159629e566e79d47a96807c7e9c305b971ff1
SHA512cf826a130f23e746d448451c35166dcba794050a1e3966c01e4375480bd1c6ac8fab14cfc9a4f6b20ef5f8f1d10f8a359052deb8edfa8154134a6f11ed99242c
-
Filesize
43KB
MD53bacb62742218b6ac1d4ab859189f9ee
SHA1362e6e456891f6efd99622de3fd0725b69f285df
SHA2563897caf0e4722447559542a07f3159629e566e79d47a96807c7e9c305b971ff1
SHA512cf826a130f23e746d448451c35166dcba794050a1e3966c01e4375480bd1c6ac8fab14cfc9a4f6b20ef5f8f1d10f8a359052deb8edfa8154134a6f11ed99242c
-
Filesize
43KB
MD53bacb62742218b6ac1d4ab859189f9ee
SHA1362e6e456891f6efd99622de3fd0725b69f285df
SHA2563897caf0e4722447559542a07f3159629e566e79d47a96807c7e9c305b971ff1
SHA512cf826a130f23e746d448451c35166dcba794050a1e3966c01e4375480bd1c6ac8fab14cfc9a4f6b20ef5f8f1d10f8a359052deb8edfa8154134a6f11ed99242c