Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 04:56
Behavioral task
behavioral1
Sample
f4bcf167d804ea705f5fa098dc7c092c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f4bcf167d804ea705f5fa098dc7c092c.exe
Resource
win10v2004-20231222-en
General
-
Target
f4bcf167d804ea705f5fa098dc7c092c.exe
-
Size
126KB
-
MD5
f4bcf167d804ea705f5fa098dc7c092c
-
SHA1
50f4304341c74e954925d9637d1e747e4256b903
-
SHA256
23415f8a5ed5e127154430fdfc450350876d64b19ec080cf678c461fd70a0dc8
-
SHA512
020a795bdcc99f38853775387994fcd2461144a34d4a3d56a54818b6e36477d896bdaa3a7631474702ba2c5e2ba6e66a2fe9ac0b57dece7cc7d66d2e340a86a3
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eTM:AnBdOOtEvwDpj6z2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation f4bcf167d804ea705f5fa098dc7c092c.exe -
Executes dropped EXE 1 IoCs
pid Process 4784 asih.exe -
resource yara_rule behavioral2/memory/2804-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x0007000000023221-13.dat upx behavioral2/memory/2804-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/4784-26-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2804 wrote to memory of 4784 2804 f4bcf167d804ea705f5fa098dc7c092c.exe 84 PID 2804 wrote to memory of 4784 2804 f4bcf167d804ea705f5fa098dc7c092c.exe 84 PID 2804 wrote to memory of 4784 2804 f4bcf167d804ea705f5fa098dc7c092c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4bcf167d804ea705f5fa098dc7c092c.exe"C:\Users\Admin\AppData\Local\Temp\f4bcf167d804ea705f5fa098dc7c092c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD529882fdedbd0141bd28851f7cb2b9c8f
SHA1eaf240a600fae2a6a3fe752d24e658a267c738a7
SHA256e518389fbce8c910500f87c4d5a9ad25bf7949289af194e4bd4c7d5138c02d4a
SHA5122322039409de34865e23ce17257661d4f30d7f53be8dd077aad29fed81ab4b54b62694bcce08fb3a3b42a695834db3bff43da92c191318c71f4f690b53cd3256