Analysis
-
max time kernel
137s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 03:32
Behavioral task
behavioral1
Sample
b94d6a9b1c4bf606211cfd4fc0008d64.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b94d6a9b1c4bf606211cfd4fc0008d64.exe
Resource
win10v2004-20231215-en
General
-
Target
b94d6a9b1c4bf606211cfd4fc0008d64.exe
-
Size
63KB
-
MD5
b94d6a9b1c4bf606211cfd4fc0008d64
-
SHA1
ef798abb52fdadc10b2a5c18f027251c13f73b5c
-
SHA256
313dffb7e793899e029533935c77608dfbfab757669ff58e39678d778dcf0cc5
-
SHA512
9966f762698fc78cdc692f6cb04226959b0c672ced4058eab1d3bc51c6a805e1134ff485501cdbc0e430efecc26145b0da9d252474ddbb703df4b9bc10c9aa79
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo6O:1nK6a+qdOOtEvwDpjN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b94d6a9b1c4bf606211cfd4fc0008d64.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 asih.exe -
resource yara_rule behavioral2/memory/4248-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x0006000000023125-13.dat upx behavioral2/memory/4248-19-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/memory/2404-26-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 2404 4248 b94d6a9b1c4bf606211cfd4fc0008d64.exe 84 PID 4248 wrote to memory of 2404 4248 b94d6a9b1c4bf606211cfd4fc0008d64.exe 84 PID 4248 wrote to memory of 2404 4248 b94d6a9b1c4bf606211cfd4fc0008d64.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b94d6a9b1c4bf606211cfd4fc0008d64.exe"C:\Users\Admin\AppData\Local\Temp\b94d6a9b1c4bf606211cfd4fc0008d64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD51387dcb8c024bd272663230d289606c8
SHA1e1bef57a60eeaaf86c16b5307dcd6bef6d6fcb64
SHA25684a25138e7c14ca0be5250a5d02dd1de8ab310eaf7f32af00330b58ffc0471b9
SHA512005193b9f436cae5f143138b57a4a0c571400c6c0784d815403bdd6465387ebd0b9ad95254e67de1cbd439bb2c62727ee0cc06fcab598e6a1946b64f9a1f7b1e