Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
b8e33469d3321e05b4952bd5ba2d68c8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b8e33469d3321e05b4952bd5ba2d68c8.exe
Resource
win10v2004-20231222-en
General
-
Target
b8e33469d3321e05b4952bd5ba2d68c8.exe
-
Size
30KB
-
MD5
b8e33469d3321e05b4952bd5ba2d68c8
-
SHA1
79010855d9696fa24409649d016010ff8a507bdf
-
SHA256
cf7120a8ab25f9d69e936cb8968fefcb9e4a4717d2bf7e63a3884f3d0da7682f
-
SHA512
23bc6e7dea3363a14d2d8679d3a4965bb78ea5f0cb0a4fbf324d36c98e07293d4ecd9bc3600c719228b83282b7f651b885433ff6f5d1bd752b4e5024762f1cd8
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tH1:q0zizzOSxMOtEvwDpj/arqV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b8e33469d3321e05b4952bd5ba2d68c8.exe -
Executes dropped EXE 1 IoCs
pid Process 3504 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3504 3020 b8e33469d3321e05b4952bd5ba2d68c8.exe 38 PID 3020 wrote to memory of 3504 3020 b8e33469d3321e05b4952bd5ba2d68c8.exe 38 PID 3020 wrote to memory of 3504 3020 b8e33469d3321e05b4952bd5ba2d68c8.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e33469d3321e05b4952bd5ba2d68c8.exe"C:\Users\Admin\AppData\Local\Temp\b8e33469d3321e05b4952bd5ba2d68c8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5ace3dfc2e2684d4355671add88ff7e98
SHA185312ebabd3f5d2c10f757e14c1ce484a53c94e7
SHA256a4162443b3e6c3382ce2f83fc2bd6f92cb88f40ff0d8f67f78a74d8ba7a1d7cc
SHA5127f463a711c70104ff180d3dae632edc4d5bbae7560f23a88eb6ba2c44da9c0f8c3b09590865aaa749bd4efe0deed6d53804f5234b2e18cdc1400a078ae3237be