Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 02:12
Behavioral task
behavioral1
Sample
8886333b8ebbb820ae9af087bbb3d97a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8886333b8ebbb820ae9af087bbb3d97a.exe
Resource
win10v2004-20240226-en
General
-
Target
8886333b8ebbb820ae9af087bbb3d97a.exe
-
Size
61KB
-
MD5
8886333b8ebbb820ae9af087bbb3d97a
-
SHA1
fed0dc5b29be6f7fef72b2d332c555ba8ab5f1bf
-
SHA256
8d2adfb0f31e848247b86467ab1aa5136da13e665088268ec9706024b64b9d45
-
SHA512
5081fcba59ad4c95b7f0d6e1e520602bdaf48556c2d5d189c25cd000b8a748dc934ed3ae717643dec37949c3bac16c9ef7b95a44c80c3d9b5f5349e77d708b70
-
SSDEEP
768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKW:P8mnK6QFElP6n+gymddpMOtEvwDpjYc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 8886333b8ebbb820ae9af087bbb3d97a.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 asih.exe -
resource yara_rule behavioral2/memory/2604-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x000400000001e5eb-13.dat upx behavioral2/memory/2604-16-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/memory/1752-26-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1752 2604 8886333b8ebbb820ae9af087bbb3d97a.exe 89 PID 2604 wrote to memory of 1752 2604 8886333b8ebbb820ae9af087bbb3d97a.exe 89 PID 2604 wrote to memory of 1752 2604 8886333b8ebbb820ae9af087bbb3d97a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8886333b8ebbb820ae9af087bbb3d97a.exe"C:\Users\Admin\AppData\Local\Temp\8886333b8ebbb820ae9af087bbb3d97a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5575914ead2a3c6d413b6b7a447e3148d
SHA1dece7d0220a1818668421db58d99cadd368097e7
SHA256c8781f83321f25903cb580bf9753bd682cde156ae6382c0f5431000e8602602c
SHA5125d680707a91d581f0d82e2c3a992870c30093c10ccb4731525e762f7fb4fced832b15a7a6b87b6d138b03aaffd6e37be04fb1f37538e98ba032e0c1ae8742443