Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe
Resource
win10v2004-20241007-en
General
-
Target
bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe
-
Size
55KB
-
MD5
c99c0ba1c1224804428be6cd5a71a007
-
SHA1
3efd35a343199091481ae4680f452589c6faced4
-
SHA256
bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b
-
SHA512
40ff17864842731d423ab3f5821e25d6baffbcbc9a18abb11269628a5b3be819418560425435839a1ca4c5270f053cb5dfad028bf404c3ce7231510e8e27dfe9
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qn8pKIRszDr6KAe2:79mqyNhQMOtEvwDpjBxe8TpXRSDeKK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2736 2808 bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe 31 PID 2808 wrote to memory of 2736 2808 bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe 31 PID 2808 wrote to memory of 2736 2808 bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe 31 PID 2808 wrote to memory of 2736 2808 bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe"C:\Users\Admin\AppData\Local\Temp\bac37bcf45de3b7dd2b63cc7e239f1cc2b5299e39d8c3f26015a6155e833322b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD523ca0ec2e3782ea5201c002e3934a188
SHA1ba1b19dc187d3f34b72c6612f2439a1f26262045
SHA256a3bf84ef44fd4798c400619313b91a0c10bf714999ebfa90fabbd908b5f72858
SHA5128c7c0694d89add050b9890af38e41222b532e4372f1e14b6fd34b3ce853ee12c4e7620143958c87aa0cc822ea1fda7f3fc50b6252697b8bc0480682aed907cb1