Analysis
-
max time kernel
181s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
e7563764e7e6f48c39c6cbc62a8c1797.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7563764e7e6f48c39c6cbc62a8c1797.exe
Resource
win10v2004-20240221-en
General
-
Target
e7563764e7e6f48c39c6cbc62a8c1797.exe
-
Size
61KB
-
MD5
e7563764e7e6f48c39c6cbc62a8c1797
-
SHA1
48f7e24c381f468e400f242a09bde523eceb9ac5
-
SHA256
ffe0dd4b97fd67cb49094a3e1bc8258e6fa8ef6a0efd2688c3ad3aa0b9dc64e8
-
SHA512
3e76f79831cfde09d4260d23b91d50f9a13200ab5074cccc0ba4e97d604e9cae6932406e73608446d414f80b96a8239dc7903f3125fefddf4b4728e7282108ad
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6d:BbdDmjr+OtEvwDpjM8U
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3538781373-1545967067-4263767959-1000\Control Panel\International\Geo\Nation e7563764e7e6f48c39c6cbc62a8c1797.exe -
Executes dropped EXE 1 IoCs
pid Process 4468 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 4468 448 e7563764e7e6f48c39c6cbc62a8c1797.exe 88 PID 448 wrote to memory of 4468 448 e7563764e7e6f48c39c6cbc62a8c1797.exe 88 PID 448 wrote to memory of 4468 448 e7563764e7e6f48c39c6cbc62a8c1797.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7563764e7e6f48c39c6cbc62a8c1797.exe"C:\Users\Admin\AppData\Local\Temp\e7563764e7e6f48c39c6cbc62a8c1797.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD526f33626d3b68fd3f53c4b3a829e3b4c
SHA13b3c26a8e13998d589776edf7ad5cc599af10560
SHA256c22467e6e301efb0c350a3f4ee96f4b4055ea313dfa928a631870f37701e8b4d
SHA512e39a49e9e113ea1c0f6842016c6809997139b55213b8abeeafa156dd162d036c7b85d0721b117ff65054fc593b41229ae5a447594e214a7ce950ff23f2ee4969