Analysis
-
max time kernel
106s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 18:12
Behavioral task
behavioral1
Sample
90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe
Resource
win7-20240903-en
General
-
Target
90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe
-
Size
54KB
-
MD5
17024d7925e5130b751a300a18e45230
-
SHA1
d158e1fa23eee58167f7ef0d40b0b106a101e459
-
SHA256
90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9
-
SHA512
6e25c36119da150f41961b71eb3bf6d0d4f1cad4744b97ef94dbd8416c76ca05e565d12689db9cd834808c7122982a7c82753f37195922eed52b85b4ef2d4c09
-
SSDEEP
768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkcb:T6QFElP6n+gxmddpMOtEvwDpjwag
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 asih.exe -
resource yara_rule behavioral2/memory/4384-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023481-13.dat upx behavioral2/memory/4384-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1984-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 1984 4384 90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe 82 PID 4384 wrote to memory of 1984 4384 90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe 82 PID 4384 wrote to memory of 1984 4384 90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe"C:\Users\Admin\AppData\Local\Temp\90d8f0210be2e8f8c5041e18bd163997d22d0d6158ebd8fd165fc70f223186a9N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5edfcbf5333b1237a81283a36aa67537d
SHA1c1b47e423c25c40cf88178b69ffd3f8950a49546
SHA25633c9e2a75a23622609991fcd17340fb871abe22be76320d45030a27426475b21
SHA5123d6e5ac9fb1a06ccf2e0e7a37a0fceb214902fb5c240adfced32f2b6b7734e00cb902f6d2869121aef4a0fbbc6c807b8ff61efd951525b2e232a5acb17846f54