Analysis
-
max time kernel
106s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe
Resource
win10v2004-20240802-en
General
-
Target
784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe
-
Size
94KB
-
MD5
4a312fb6ca93ee867d022f5ac4e79090
-
SHA1
ee7521b2eee22766a49f048216e5c1315e5b8b66
-
SHA256
784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943
-
SHA512
54bf03fc6fd99b7ee4c506bf6f5ff9b9c1397e43ab5a5012a0e1a181c346aa62bbfa2989a586f9b338942ceb3bde306e27236d55dc8951c2338e8b0942e64f52
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgb5:V6a+pOtEvwDpjtzI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2728 wrote to memory of 1992 2728 784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe 82 PID 2728 wrote to memory of 1992 2728 784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe 82 PID 2728 wrote to memory of 1992 2728 784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe"C:\Users\Admin\AppData\Local\Temp\784611bcefbb7fb0a53d8b88b8672fb08167dc5190da4874f60986b1d6c0a943N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5798757ec9b9fd90a8711c26649ab9e97
SHA11de768036c5eb9dad4f68463469bc4264c3fb4a6
SHA256e83dbe2ca504538cc293f1432ba1fa5f24a5d08e13f7d93ae2fdf7658f30320a
SHA512524773de868cfd77d596e8779b1f99b53b15cfb6021931f1b8b9726fbb71f09c7239afa20e74c525397bafdb056d99df35ad6d51ff059661529ccfa276a14ce0