Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2024, 05:22

General

  • Target

    e096bfa52495c795620d6286d34aae20.exe

  • Size

    45KB

  • MD5

    e096bfa52495c795620d6286d34aae20

  • SHA1

    6453059c7a886328c360d8c34926b750482c6083

  • SHA256

    e188779d7de5c4896d24a775d330a085583638c91d5e6b72c2a7b37cba3c2e37

  • SHA512

    bff2562137cee80bf534299d31a00e5628902741b8a8b733bde4d00e62fe4183160bf70085c39aff5688d3d53acc7ff5e8b235b79ccfcefbeab8418a2856d0f4

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9H7Zhwu:X6QFElP6n+gJQMOtEvwDpjBmzDkWDt71

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e096bfa52495c795620d6286d34aae20.exe
    "C:\Users\Admin\AppData\Local\Temp\e096bfa52495c795620d6286d34aae20.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    5ea2a98ea914571dafdcd2bf1e845fff

    SHA1

    f037bb5e8916753ae451c3f5a61c0047d5c8daa6

    SHA256

    0cc7e61588b5c6e94adad534ef1ca214db74d920bdbd5912f040b4705ebe29af

    SHA512

    4f7eabbbb94da76159b07e33878a14dda684d372c196860c7b6990be89a454faa3a6a6b562ed29fa9ff33c0542b7fe12b68273232b266e2c9fa1fc57a85fdb49

  • memory/1304-17-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/1304-23-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3020-0-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/3020-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/3020-2-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB