Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 08:50

General

  • Target

    d26ba241efcc32a6d24e36689d6e8b8e20652c5ac1313d0db701fbe0c2670633.exe

  • Size

    49KB

  • MD5

    90b3f18920ad7bae72808a518a81df2a

  • SHA1

    74352691b7761e137f9443e1e37a92297f082174

  • SHA256

    d26ba241efcc32a6d24e36689d6e8b8e20652c5ac1313d0db701fbe0c2670633

  • SHA512

    185ca5ed666d408e3cd0708115b0964b4bdb158fec16a2afb728798598c3e826f257f67aa445d3d064b3a1785f234847d43de1c29a83d88aaec877e98191a368

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/Dpkcs:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfs

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d26ba241efcc32a6d24e36689d6e8b8e20652c5ac1313d0db701fbe0c2670633.exe
    "C:\Users\Admin\AppData\Local\Temp\d26ba241efcc32a6d24e36689d6e8b8e20652c5ac1313d0db701fbe0c2670633.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    beeda1a240e1d3b04aee2aca197f7fe2

    SHA1

    f5f723721b43d747c568338535747dd5430e161f

    SHA256

    47eb74b227a1d6a75d8fbf62a39eec8ec81a35201a36d38d3d158270063d5478

    SHA512

    d5878d25684d8b3659216dac26d8489b718241dfd0a0c4bbeca3c3a04dc103abf00f6e8ac3f198044f83a6c053674e8b7d6a2886c6ec86a164a915ee8f9f3903

  • memory/1428-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1428-2-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/1428-1-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/1428-3-0x0000000000610000-0x0000000000616000-memory.dmp

    Filesize

    24KB

  • memory/1428-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1464-19-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/1464-25-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/1464-26-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB