Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
f12f7eb23acad7cf91928ee8db02a454.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f12f7eb23acad7cf91928ee8db02a454.exe
Resource
win10v2004-20240508-en
General
-
Target
f12f7eb23acad7cf91928ee8db02a454.exe
-
Size
47KB
-
MD5
f12f7eb23acad7cf91928ee8db02a454
-
SHA1
04722a0f008ccd954cb90a76228363db6e5ebfad
-
SHA256
9ee6d078eed8973f45088a4e47db59a54c373e81e2c9c3e835229237c73347fe
-
SHA512
12a691804f689cfb748a1f62e1446dbf0980214406b3821142647e147b7c8d41bea81863d0e996d6a55beeae1a8fb48ddc5c1e51c2f6db806028fca830cdc1aa
-
SSDEEP
768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/Dpkcl:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation f12f7eb23acad7cf91928ee8db02a454.exe -
Executes dropped EXE 1 IoCs
pid Process 3588 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1160 wrote to memory of 3588 1160 f12f7eb23acad7cf91928ee8db02a454.exe 82 PID 1160 wrote to memory of 3588 1160 f12f7eb23acad7cf91928ee8db02a454.exe 82 PID 1160 wrote to memory of 3588 1160 f12f7eb23acad7cf91928ee8db02a454.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f12f7eb23acad7cf91928ee8db02a454.exe"C:\Users\Admin\AppData\Local\Temp\f12f7eb23acad7cf91928ee8db02a454.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD516f01b753e520c4bd7a46b211f6a84a9
SHA1abd734c82c9070e09facc863f9d7729a27d344ea
SHA2560af2412adca9b7e5abd930484e1276d4587079ee689213cdcdbdf92d1def4ae9
SHA51257ff3e25c33894e7048649b6153d8321c8e13ba2215df37f15db8665fd5be1ca8c412e1c47089461630c9032189e7908c6c61de7fd4c33c67aa4287a417fa080