Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 05:33
Behavioral task
behavioral1
Sample
e8674e2d11da492eac828e1753f56c68.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e8674e2d11da492eac828e1753f56c68.exe
Resource
win10v2004-20240426-en
General
-
Target
e8674e2d11da492eac828e1753f56c68.exe
-
Size
40KB
-
MD5
e8674e2d11da492eac828e1753f56c68
-
SHA1
da8a2b79a94ea376ae1cbed74f8c4114471fcf77
-
SHA256
67b67baae2d2172c4309b91df1bc969a23509328e0600d23712068c586c71183
-
SHA512
b40590f2fb82f702501926959eb2c1fe71fe6aab6c0fedff9370aa54ea1b12b430b62f6cda791e31c9d3974a3fbb5897fa236eb60ba1c5f68fdbdd321609efc0
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYo:qDdFJy3QMOtEvwDpjjWMl7T1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation e8674e2d11da492eac828e1753f56c68.exe -
Executes dropped EXE 1 IoCs
pid Process 4444 asih.exe -
resource yara_rule behavioral2/memory/4816-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0007000000023298-13.dat upx behavioral2/memory/4444-19-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4816-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4444-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4444 4816 e8674e2d11da492eac828e1753f56c68.exe 82 PID 4816 wrote to memory of 4444 4816 e8674e2d11da492eac828e1753f56c68.exe 82 PID 4816 wrote to memory of 4444 4816 e8674e2d11da492eac828e1753f56c68.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8674e2d11da492eac828e1753f56c68.exe"C:\Users\Admin\AppData\Local\Temp\e8674e2d11da492eac828e1753f56c68.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD587f9dadc719a85732102ece02d5cebf9
SHA1f3ae1d0eba1ba4a74a29fc6685562432f8edd7d2
SHA256f1cc91e3894021c9a2ae2e9b0e6c248462ed16ba902bde45fb1d72a32e7096d1
SHA51273c03cbf0685f23f3588093259e8770684940814df4f2a97f83465c3cb9504800cf48d466587c975f54e114b476f1c97ed5e96e4e990c9dd3f49b4093a566f9d