Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 02:55
Behavioral task
behavioral1
Sample
e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe
Resource
win7-20240903-en
General
-
Target
e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe
-
Size
40KB
-
MD5
e6c42a033c4332dc613d98fc1033a300
-
SHA1
2f500f7316787094197c8ffad3e71b94ed13478f
-
SHA256
e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6
-
SHA512
dca7204a4035d01dd3b526b56f80ea2e67e9b62555adfa4473a289276af3106fa764be9fe4ec2be6d63f2e6b870f52c23c075e6eea6b5fbee8e4ebe557c910d6
-
SSDEEP
768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRi5:qTJu9cvMOtEvwDpjppVXzRI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe -
Executes dropped EXE 1 IoCs
pid Process 4244 asih.exe -
resource yara_rule behavioral2/memory/3908-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000800000002347f-13.dat upx behavioral2/memory/3908-18-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/4244-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4244 3908 e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe 84 PID 3908 wrote to memory of 4244 3908 e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe 84 PID 3908 wrote to memory of 4244 3908 e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe"C:\Users\Admin\AppData\Local\Temp\e069e76ebf5f16d5949b332383c6032962381dbce9bf3424493c34f09373f7f6.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD58eeb62616d4cbc990668363418576f77
SHA169f786cd6ccbc284d4e2d174da5804c4c6eabe53
SHA256cb4dd8257dd47c4afbdedbc1cafc215c38fcf1fff378fa6615f7dcf5d80e8873
SHA5129530e448d89acf45dcb4c911386aed76e2ff2e2d951633b167526f4d582975782a4237c06895deef69966a1488520ac20a770cb856dee6cdd76a926d104733c2