Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
6a99d38b8332bdd3e2287839d28f3b72.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a99d38b8332bdd3e2287839d28f3b72.exe
Resource
win10v2004-20231215-en
General
-
Target
6a99d38b8332bdd3e2287839d28f3b72.exe
-
Size
45KB
-
MD5
6a99d38b8332bdd3e2287839d28f3b72
-
SHA1
50fc07026b4bffecfc9687a42cdcbd7b5fac4ab7
-
SHA256
4e400870621733199f3985b670b3871a222af2cff19430fb7b8f68ac0f5a346e
-
SHA512
7e52baf8a9efb4d12c6937bb49c117fca00faa48395dde73157da47d2efca6c913bd6a12825aeed7473a7bb13d6ee35c148ffd8909e2964f3b14f8146f414b6a
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556yPRKY:X6QFElP6n+gJQMOtEvwDpjB0GIWvPRX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 6a99d38b8332bdd3e2287839d28f3b72.exe -
Executes dropped EXE 1 IoCs
pid Process 3560 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3560 2580 6a99d38b8332bdd3e2287839d28f3b72.exe 87 PID 2580 wrote to memory of 3560 2580 6a99d38b8332bdd3e2287839d28f3b72.exe 87 PID 2580 wrote to memory of 3560 2580 6a99d38b8332bdd3e2287839d28f3b72.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a99d38b8332bdd3e2287839d28f3b72.exe"C:\Users\Admin\AppData\Local\Temp\6a99d38b8332bdd3e2287839d28f3b72.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD543e199dc1a55a2d47731c625bd15059f
SHA1ead079d71c96feb868ce40fdb05435afafef69cb
SHA2560fa554d33c80a9026d20575a001b503a154ec01d52d090f6586eff02fc3d0208
SHA5123b384daa97d41d0e7c02087b21a3fb3136efca8744c67b190b09f0149e834b3becfc4a948bd06eec2a53508451aa4ddd788f3aa0d18f303a71da52bd5aaa963f