Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 03:45
Behavioral task
behavioral1
Sample
a93a2553db7ce8d3ff98313a663bd776.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a93a2553db7ce8d3ff98313a663bd776.exe
Resource
win10v2004-20240226-en
General
-
Target
a93a2553db7ce8d3ff98313a663bd776.exe
-
Size
86KB
-
MD5
a93a2553db7ce8d3ff98313a663bd776
-
SHA1
bb60fab2a764d7645c56351d1acda7ca7b548894
-
SHA256
9ee9436d2a273f2dec9360891b13b9b5198af14447cb3b0febed769d6694fd36
-
SHA512
ac4accfaaa9160d49f69ab58c13c7ed94321c8f6484a099efc75c605de87ba716fef0cb58d334a2b82aaff9281a5f74e34f23992acca705abc4def5714a891a0
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISEJ:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation a93a2553db7ce8d3ff98313a663bd776.exe -
Executes dropped EXE 1 IoCs
pid Process 5040 asih.exe -
resource yara_rule behavioral2/memory/3620-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000700000002320c-12.dat upx behavioral2/memory/3620-24-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/5040-25-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3620 wrote to memory of 5040 3620 a93a2553db7ce8d3ff98313a663bd776.exe 89 PID 3620 wrote to memory of 5040 3620 a93a2553db7ce8d3ff98313a663bd776.exe 89 PID 3620 wrote to memory of 5040 3620 a93a2553db7ce8d3ff98313a663bd776.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a93a2553db7ce8d3ff98313a663bd776.exe"C:\Users\Admin\AppData\Local\Temp\a93a2553db7ce8d3ff98313a663bd776.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5441802da14a678d6dfc0e59b2da21bf6
SHA1612f6a81b33f4ba330be24771e333f1a2163e450
SHA256b26161db4415b409cd29cef0a582e04a2f0049e34e935673060c04d1397f971c
SHA512978c194e8a2d375e27904a229ae53119af28b04632b9e6fe59c1bc2109d20f1e3c312375b02f0b353e1786dfd8758a9b41eaebadda5a654e9bc3eedd0a87ad45