Analysis

  • max time kernel
    139s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2023, 16:43

General

  • Target

    77b5c684ff153f_JC.exe

  • Size

    144KB

  • MD5

    77b5c684ff153f3cb8cfcee31e98ec2f

  • SHA1

    02fabeda5d231ce52eec680edf311fcc799f2bea

  • SHA256

    5e795752d30cd45a49683b9807e830c6bc3c93fbcdd901223fece2a63c3765a8

  • SHA512

    51216dd528be5b803400b2b2ae9920650130e444b5c8708779d7fc1bb8bc7d1993b27030b7ba17e54e67bff4771ee40afdb90fb51ed9acd47922d7b195c0e4b0

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooHPblPg+:V6a+pOtEvwDpjt22N

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77b5c684ff153f_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\77b5c684ff153f_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1352

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          144KB

          MD5

          e726d870c4b670cd2dbd57cf602bdd2e

          SHA1

          905a3317a9aa121e34e2bce955ba2b8947d5f617

          SHA256

          d03ddeae7e7a3089ca761bf985246a5093dec10b4cb1b75b17d02f46bcb52b52

          SHA512

          e35662115a4d1ad81164265542f9eea3dd581965bceeee6aa3f35720fc3bed674a1e26a3a86a7e0ad06df52b306463fe1cd681be51406ca6ba063e8d7a948d18

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          144KB

          MD5

          e726d870c4b670cd2dbd57cf602bdd2e

          SHA1

          905a3317a9aa121e34e2bce955ba2b8947d5f617

          SHA256

          d03ddeae7e7a3089ca761bf985246a5093dec10b4cb1b75b17d02f46bcb52b52

          SHA512

          e35662115a4d1ad81164265542f9eea3dd581965bceeee6aa3f35720fc3bed674a1e26a3a86a7e0ad06df52b306463fe1cd681be51406ca6ba063e8d7a948d18

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          144KB

          MD5

          e726d870c4b670cd2dbd57cf602bdd2e

          SHA1

          905a3317a9aa121e34e2bce955ba2b8947d5f617

          SHA256

          d03ddeae7e7a3089ca761bf985246a5093dec10b4cb1b75b17d02f46bcb52b52

          SHA512

          e35662115a4d1ad81164265542f9eea3dd581965bceeee6aa3f35720fc3bed674a1e26a3a86a7e0ad06df52b306463fe1cd681be51406ca6ba063e8d7a948d18

        • memory/1352-153-0x0000000002070000-0x0000000002076000-memory.dmp

          Filesize

          24KB

        • memory/1352-154-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/3932-136-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB

        • memory/3932-137-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB

        • memory/3932-138-0x00000000021C0000-0x00000000021C6000-memory.dmp

          Filesize

          24KB