Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 18:25
Behavioral task
behavioral1
Sample
a405882af5bc52_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a405882af5bc52_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
a405882af5bc52_JC.exe
-
Size
57KB
-
MD5
a405882af5bc5292e00afdd8a57437bf
-
SHA1
ddee0d89170d49dac193ce52a1c023d3b01edeea
-
SHA256
e7e8c809d9b45dc539764ec0a1158f5e4f5ea097cf3155f5d494499c4afb87cf
-
SHA512
caf1326211ed7b77ecebcaf32b6f156f578761e7b3932b02d0eedbf23ba1debc625317933d99bba20db7dedb991829ee181de42b753c872c787e505afc21f1c0
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTFH3b:T6a+rdOOtEvwDpjNT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation a405882af5bc52_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 3660 asih.exe -
resource yara_rule behavioral2/memory/5008-133-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023228-146.dat upx behavioral2/memory/5008-149-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023228-148.dat upx behavioral2/files/0x0008000000023228-150.dat upx behavioral2/memory/3660-159-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3660 5008 a405882af5bc52_JC.exe 86 PID 5008 wrote to memory of 3660 5008 a405882af5bc52_JC.exe 86 PID 5008 wrote to memory of 3660 5008 a405882af5bc52_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a405882af5bc52_JC.exe"C:\Users\Admin\AppData\Local\Temp\a405882af5bc52_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD51f73ec97dba73418d114644869a5a666
SHA1edc9347ec79f97509a0cba9f0c4fd359c02682ec
SHA2561e6950aa54426d5a21c5da8f5b5fd8c54bc777f6f521e5381243caa8dd9eaf8d
SHA512a9e295ac52cb9978a0d9f41a1ec89060edadd73a681f867896a3ed16a99e6f1f5a9fa2932625cce44ff9267cd23e7547a0d66b670d46c7fc1bfbcd7338eccfab
-
Filesize
57KB
MD51f73ec97dba73418d114644869a5a666
SHA1edc9347ec79f97509a0cba9f0c4fd359c02682ec
SHA2561e6950aa54426d5a21c5da8f5b5fd8c54bc777f6f521e5381243caa8dd9eaf8d
SHA512a9e295ac52cb9978a0d9f41a1ec89060edadd73a681f867896a3ed16a99e6f1f5a9fa2932625cce44ff9267cd23e7547a0d66b670d46c7fc1bfbcd7338eccfab
-
Filesize
57KB
MD51f73ec97dba73418d114644869a5a666
SHA1edc9347ec79f97509a0cba9f0c4fd359c02682ec
SHA2561e6950aa54426d5a21c5da8f5b5fd8c54bc777f6f521e5381243caa8dd9eaf8d
SHA512a9e295ac52cb9978a0d9f41a1ec89060edadd73a681f867896a3ed16a99e6f1f5a9fa2932625cce44ff9267cd23e7547a0d66b670d46c7fc1bfbcd7338eccfab