Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
0f9f7e31a769bdb4e46b47b00544192b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f9f7e31a769bdb4e46b47b00544192b.exe
Resource
win10v2004-20240226-en
General
-
Target
0f9f7e31a769bdb4e46b47b00544192b.exe
-
Size
130KB
-
MD5
0f9f7e31a769bdb4e46b47b00544192b
-
SHA1
57874ba14bbd53d38b783bf797c04cdfc975c1e4
-
SHA256
1988e39bff64eb08f849e310e17ba5ad8b4900852cab1e002e7c3415e9b30f02
-
SHA512
07cff06d0817fbe57be12ba985dd7548856980a2f451cca9f408c26290fa2d0fe06562ee0a06326f3f4837fda09019be474d837fc955d143d810fb83378fafe1
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgp699GNtL1ewb:V6a+pOtEvwDpjtzs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 0f9f7e31a769bdb4e46b47b00544192b.exe -
Executes dropped EXE 1 IoCs
pid Process 4296 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 808 wrote to memory of 4296 808 0f9f7e31a769bdb4e46b47b00544192b.exe 90 PID 808 wrote to memory of 4296 808 0f9f7e31a769bdb4e46b47b00544192b.exe 90 PID 808 wrote to memory of 4296 808 0f9f7e31a769bdb4e46b47b00544192b.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f9f7e31a769bdb4e46b47b00544192b.exe"C:\Users\Admin\AppData\Local\Temp\0f9f7e31a769bdb4e46b47b00544192b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD584457109c91bd789f4dcae82b5184f0e
SHA151c0d853c487971db99243bbfdbb43e5f57bd26a
SHA2563176759efcb55726f5fd2ae6d3c372b02444760d4924fb391cb8a60767c137cd
SHA5126164a30125652ac170222e4c49ac0599a3e6de9b7604eb4a14eaf671e0f91c20d916b362997ffe6cc2f4b4b975bf1f882aab65f3d6017435f02a02c6bb5c1457