Analysis

  • max time kernel
    106s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 00:28

General

  • Target

    e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe

  • Size

    52KB

  • MD5

    1face740e1eb63b8829cbbdda49c78a0

  • SHA1

    79c9fff07032b06050f9caacba0a6018f3e21723

  • SHA256

    e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567

  • SHA512

    9c60d300a4b9d4d5b8a438829d8565f661ce8b4a1c4fde846dd5a1dbc934beab9f3cb4023e55b6996a2b7c71c837b382c856fdd26bdfbaeb90ff14233bd45dc8

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtgED:V6QFElP6n+gMQMOtEvwDpjyaLccVgO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe
    "C:\Users\Admin\AppData\Local\Temp\e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    52KB

    MD5

    0bf1764c36cd26d4d989ef61428607c9

    SHA1

    5a089f4fc6ad99b1a56014529bf7e3a6148fdff7

    SHA256

    d889c7cdf2c9e9d5b98831ec8db6429edbb915224b0651d07d10640f151e8e45

    SHA512

    e6766e91472b6031838a1328b0789a69f8090a40153289803141864c2df3ce600351c7abc91aece226839ab7b49a17e83db63ede6945757925d6d61603e90709

  • memory/2164-17-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/2164-23-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/5068-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/5068-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/5068-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB