Analysis
-
max time kernel
106s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe
Resource
win10v2004-20240802-en
General
-
Target
8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe
-
Size
50KB
-
MD5
eb2085b400062adc147526fc835f6410
-
SHA1
f1d9b5e74a8ffdea56fed80e6a04c59fae8f1e86
-
SHA256
8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69
-
SHA512
8b2dffec3c28eba03431fa87f48c072dfb34ce050ebd9d06fbb961c7ca77ba5334256f586285a427117430dc790b69a50464a5b6e04619fb93c0c568c1eb6e2d
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556BlvsTk:X6QFElP6n+gJQMOtEvwDpjB0GIWSlvIk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2816 2496 8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe 82 PID 2496 wrote to memory of 2816 2496 8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe 82 PID 2496 wrote to memory of 2816 2496 8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe"C:\Users\Admin\AppData\Local\Temp\8e5be9bf166cc9d3ed497c142fc47eda265a2bc6ce07107d72d01d48c658ec69N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5afaf3e32f398ecde3f60b8ef064636da
SHA1d680a02bca71cc184e588b47cfbb9da57237f613
SHA256d1e3bcf98e524a49d878e2ca1ca892f40ff292b0499c8c3dcf2958f61a70994d
SHA512a056a7b4fa982adc2f7e423fe8fab4936e64f5c337a6ae1f44083cb61ed4abc31b5f479c86213ee3ea1078e54f46fd3166d28b2676c1094aee74abb584d826a1