Analysis
-
max time kernel
106s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe
Resource
win10v2004-20240802-en
General
-
Target
e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe
-
Size
52KB
-
MD5
1face740e1eb63b8829cbbdda49c78a0
-
SHA1
79c9fff07032b06050f9caacba0a6018f3e21723
-
SHA256
e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567
-
SHA512
9c60d300a4b9d4d5b8a438829d8565f661ce8b4a1c4fde846dd5a1dbc934beab9f3cb4023e55b6996a2b7c71c837b382c856fdd26bdfbaeb90ff14233bd45dc8
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtgED:V6QFElP6n+gMQMOtEvwDpjyaLccVgO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe -
Executes dropped EXE 1 IoCs
pid Process 2164 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2164 5068 e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe 82 PID 5068 wrote to memory of 2164 5068 e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe 82 PID 5068 wrote to memory of 2164 5068 e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe"C:\Users\Admin\AppData\Local\Temp\e57710af7504a617316c249faad58665d2c3a83411f2329338bcef3a67fce567N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD50bf1764c36cd26d4d989ef61428607c9
SHA15a089f4fc6ad99b1a56014529bf7e3a6148fdff7
SHA256d889c7cdf2c9e9d5b98831ec8db6429edbb915224b0651d07d10640f151e8e45
SHA512e6766e91472b6031838a1328b0789a69f8090a40153289803141864c2df3ce600351c7abc91aece226839ab7b49a17e83db63ede6945757925d6d61603e90709