Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
dfa1c2b80762717d044ed8a6e475918f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfa1c2b80762717d044ed8a6e475918f.exe
Resource
win10v2004-20240226-en
General
-
Target
dfa1c2b80762717d044ed8a6e475918f.exe
-
Size
63KB
-
MD5
dfa1c2b80762717d044ed8a6e475918f
-
SHA1
265d478b5d9d20c81e82346a8d7ce6b3248bc25e
-
SHA256
6fd123d1ad1ea75df8676cfeaa5778fde10e2fef6a4772ba7126213839c9c0a3
-
SHA512
01f850faf788f4b84af2350de958b4f3b2b5d0ce62675348e3228b68a3dc49f2ec973db74f2e5ff09b07de6dd72077ced0b4765f0a35671e2c26c416f5f5cd3e
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmhGQzy:V6a+pOtEvwDpjvu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation dfa1c2b80762717d044ed8a6e475918f.exe -
Executes dropped EXE 1 IoCs
pid Process 988 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1804 wrote to memory of 988 1804 dfa1c2b80762717d044ed8a6e475918f.exe 96 PID 1804 wrote to memory of 988 1804 dfa1c2b80762717d044ed8a6e475918f.exe 96 PID 1804 wrote to memory of 988 1804 dfa1c2b80762717d044ed8a6e475918f.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfa1c2b80762717d044ed8a6e475918f.exe"C:\Users\Admin\AppData\Local\Temp\dfa1c2b80762717d044ed8a6e475918f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2264,i,13734085038406049477,12426093271221802693,262144 --variations-seed-version /prefetch:81⤵PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5b61242b14292c9494bd6dd9d6400e1d6
SHA16b7178b4dabb75cf2442208a0a13cbd804149c33
SHA256c865698f51a5c690240c18ff02e7c00cf6af4bad25f3b7af96c3b0fafea9e943
SHA51225c117ab34e29d7ef8d67dc9a999e044abbad1c8acf86c24a3a19dabec9185d12fb21752f1f758f925e98d092495883dc75383cf01552959656597c7e20bcd01