Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 03:21
Static task
static1
Behavioral task
behavioral1
Sample
5a2f5a208154d70ae95a1d93c12773a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a2f5a208154d70ae95a1d93c12773a1.exe
Resource
win10v2004-20231215-en
General
-
Target
5a2f5a208154d70ae95a1d93c12773a1.exe
-
Size
22KB
-
MD5
5a2f5a208154d70ae95a1d93c12773a1
-
SHA1
7b1b5f41401f1eef78cd16ff148f6c5f74f17fee
-
SHA256
22dada54a2964a95eac68bd706d023849e0c8e9f35bf9b557b4db4e47903faac
-
SHA512
8033e27b6ecbf13c36120350679df9f5b42f1095ef7157a9d7563bb70be08d35a88a860597f8c937ebd291e4e8793aa0f7482eb4af2ac49abe3dad956de3041c
-
SSDEEP
384:7VG/EvX8tHEnD+rPkChwWtUIyipVyb8NKe:7I4DD+LzrnVmZe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 5a2f5a208154d70ae95a1d93c12773a1.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation fahik.exe -
Executes dropped EXE 1 IoCs
pid Process 3812 fahik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 3812 1412 5a2f5a208154d70ae95a1d93c12773a1.exe 90 PID 1412 wrote to memory of 3812 1412 5a2f5a208154d70ae95a1d93c12773a1.exe 90 PID 1412 wrote to memory of 3812 1412 5a2f5a208154d70ae95a1d93c12773a1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a2f5a208154d70ae95a1d93c12773a1.exe"C:\Users\Admin\AppData\Local\Temp\5a2f5a208154d70ae95a1d93c12773a1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\fahik.exe"C:\Users\Admin\AppData\Local\Temp\fahik.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5d9fb20e1175badfd3d7093d17a9ff4f2
SHA1f9cd9a6cf5fe750610e03ec622fc5cb420708cbc
SHA256fb369d2fa7d44c8db0292eab1bde72d4bfda2c5493505399d0176b84474a6421
SHA51215965781ae6bed2beb43c6dd335dec545897c3b845cfa52b8943a9a0f9f3ecf435e2c8543f1a83b7fea304193f935f07c8e6346bc42acd4c600ea8cccb590b28
-
Filesize
70KB
MD51c78cf4cb43f108e667aa4cc1efefb8d
SHA16ae5f94fc7482ed6139312fc9799d57bc8f48817
SHA2566a1f3879a4385ec2dd8d83e57baab9893bf8b8b976c2739e8699cd818d6c7b8f
SHA51285386abb2333c8921f558cfdc8c8ddea7da4f40637441ac24e0a28a9bd4e2a3fdb6a0212ea0161f7578928ddaf1175c6f7ceaf5439eb152448d4b37926e00318