Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 01:40

General

  • Target

    dbcdc5374329866865760822bcc66b1670ae891421f1e93dfa3b08c2a3c9ac9f.exe

  • Size

    48KB

  • MD5

    88cfab102ec9f81bad309828749cae35

  • SHA1

    5f5f886251726684c177be62f6c27e57f46c0f00

  • SHA256

    dbcdc5374329866865760822bcc66b1670ae891421f1e93dfa3b08c2a3c9ac9f

  • SHA512

    3f0e617a635f44dfff7248c4e62954599523276164378b67cc5c5012c8df75d9447bd4b63657c1a9bce590983aeb811da29e3f5d432bc73a529ae799a69650cd

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBKccJVODvy3Sp8Lg:79mqyNhQMOtEvwDpjBzckqSu8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbcdc5374329866865760822bcc66b1670ae891421f1e93dfa3b08c2a3c9ac9f.exe
    "C:\Users\Admin\AppData\Local\Temp\dbcdc5374329866865760822bcc66b1670ae891421f1e93dfa3b08c2a3c9ac9f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    85b6d072a54112dd72907091e9409da9

    SHA1

    f1d68b0f64cc60254e76f3bc3dc73ade11119e00

    SHA256

    6e7edf969a3c887fa6046de1dd28a00735adcb82640545769570c1578a695bc9

    SHA512

    cfdbd339d2f4558784ebbfc1489ec33d445c109fc84e17d685c1595b70fcbbbb392584a23b16e0a3983de514d5e93d2249961d7d535e84b267fe24b8adb66a56

  • memory/884-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/884-20-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/884-26-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/4612-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4612-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4612-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4612-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4612-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB