Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2023, 12:37

General

  • Target

    4680bac69e035cexeexe_JC.exe

  • Size

    102KB

  • MD5

    4680bac69e035cd365f8c67010d139c1

  • SHA1

    dad983346b55d8b29b9e6c0425c2d94a5752a204

  • SHA256

    da99706b8ee6403b139582ebfac4ed645f22ac42ba731e0a0c57689cbac8c436

  • SHA512

    7414b580c70d3c484a948181f831a591f6ff7ce04166992a0c7cace9f149385a4d902c9f86fb8a8337ebf661345836860f0cbc827ebddd7706d78cd6f3af7f12

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNuj2GQi8b/xv4TSeAk:V6a+pOtEvwDpjtzW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4680bac69e035cexeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4680bac69e035cexeexe_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    102KB

    MD5

    e3ef373abd8ffef798b6e64b4d45c676

    SHA1

    6a6eea45c725ac1ee540fc46d949015b13411148

    SHA256

    2487ef5c6df1c5520a67ba87e4a15fcfa6e732b8de60675aff5fb5a3b2fc87eb

    SHA512

    842090f5b0114ee28998ec57913077db64d0d06c5b700a51ad25ebca7863e71f945ed6e5e911a0776a3612dbfca22b4231bb3682b5770d9632c8b070bf93581d

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    102KB

    MD5

    e3ef373abd8ffef798b6e64b4d45c676

    SHA1

    6a6eea45c725ac1ee540fc46d949015b13411148

    SHA256

    2487ef5c6df1c5520a67ba87e4a15fcfa6e732b8de60675aff5fb5a3b2fc87eb

    SHA512

    842090f5b0114ee28998ec57913077db64d0d06c5b700a51ad25ebca7863e71f945ed6e5e911a0776a3612dbfca22b4231bb3682b5770d9632c8b070bf93581d

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    102KB

    MD5

    e3ef373abd8ffef798b6e64b4d45c676

    SHA1

    6a6eea45c725ac1ee540fc46d949015b13411148

    SHA256

    2487ef5c6df1c5520a67ba87e4a15fcfa6e732b8de60675aff5fb5a3b2fc87eb

    SHA512

    842090f5b0114ee28998ec57913077db64d0d06c5b700a51ad25ebca7863e71f945ed6e5e911a0776a3612dbfca22b4231bb3682b5770d9632c8b070bf93581d

  • memory/4008-150-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4008-151-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/5056-133-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/5056-134-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/5056-135-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB