Analysis
-
max time kernel
90s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe
Resource
win10v2004-20231215-en
General
-
Target
00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe
-
Size
65KB
-
MD5
05fb20bd1634906c40aa68847700faf2
-
SHA1
dc7203965e95128a551e8c26b063f8ef4fe0e321
-
SHA256
00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8
-
SHA512
6691e86f4e08eecc883446f36b5248e20c03beab1b049d081e2e239ffe4e59e8c1811ba0e3d13b4f5fc770c9d7715db9e2c124f6ca745dc67158a996e53ae8ef
-
SSDEEP
768:7I4DD+LzjPsED3VK2+ZtyOjgO4r9vFAg2rqnpd2GRqDKT:71DD+LzjYTjipvF2zu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation fahik.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 fahik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 2920 3148 00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe 85 PID 3148 wrote to memory of 2920 3148 00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe 85 PID 3148 wrote to memory of 2920 3148 00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe"C:\Users\Admin\AppData\Local\Temp\00957f09b84f6fe5515fb16571671e594d920fa23fcb277f48c968566f80d4e8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\fahik.exe"C:\Users\Admin\AppData\Local\Temp\fahik.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD517dc92815eca24501707aadeb926f58a
SHA106654b9857942206c7053096a4d3fd868a6c4076
SHA2569b4ae93af410c073a111c3c1ac78fe0c4e58966868b4237b83440ea6147931f2
SHA5126aee552fa3412458fe1f4f6ad0342d5c4611e464d4b76d6067698c8f047310c44a25a04058d5ca061cb30b221102502b30fe3afc2763617027cfb48e54bb4565
-
Filesize
80KB
MD53e788b1604fbf25cd28ccea329595927
SHA1b18c98da558cc926a196041da1338b3d87065d17
SHA256dfb1ecaf48b1968cbbda72a7b77ef08955be8ff1f72bd276c2fc6bbf6bcde48a
SHA5120e889a5e39616ea9e059e269959c35b5aebd44dd771d34a6da76480d6e952002eab16eae258e376f82bd601df5060b76df0965467fdcadcf5c455a4370b8258a