Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 01:42

General

  • Target

    6a99d38b8332bdd3e2287839d28f3b72.exe

  • Size

    45KB

  • MD5

    6a99d38b8332bdd3e2287839d28f3b72

  • SHA1

    50fc07026b4bffecfc9687a42cdcbd7b5fac4ab7

  • SHA256

    4e400870621733199f3985b670b3871a222af2cff19430fb7b8f68ac0f5a346e

  • SHA512

    7e52baf8a9efb4d12c6937bb49c117fca00faa48395dde73157da47d2efca6c913bd6a12825aeed7473a7bb13d6ee35c148ffd8909e2964f3b14f8146f414b6a

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556yPRKY:X6QFElP6n+gJQMOtEvwDpjB0GIWvPRX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a99d38b8332bdd3e2287839d28f3b72.exe
    "C:\Users\Admin\AppData\Local\Temp\6a99d38b8332bdd3e2287839d28f3b72.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    45KB

    MD5

    43e199dc1a55a2d47731c625bd15059f

    SHA1

    ead079d71c96feb868ce40fdb05435afafef69cb

    SHA256

    0fa554d33c80a9026d20575a001b503a154ec01d52d090f6586eff02fc3d0208

    SHA512

    3b384daa97d41d0e7c02087b21a3fb3136efca8744c67b190b09f0149e834b3becfc4a948bd06eec2a53508451aa4ddd788f3aa0d18f303a71da52bd5aaa963f

  • memory/2580-0-0x0000000000700000-0x0000000000706000-memory.dmp

    Filesize

    24KB

  • memory/2580-1-0x0000000000700000-0x0000000000706000-memory.dmp

    Filesize

    24KB

  • memory/2580-2-0x0000000000720000-0x0000000000726000-memory.dmp

    Filesize

    24KB

  • memory/3560-17-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/3560-20-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB