Analysis
-
max time kernel
28s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230621-en
General
-
Target
tmp.exe
-
Size
3.9MB
-
MD5
4b1939902232c11b9823d6c3d96c99be
-
SHA1
d9c957c672a978251476385dba46e87bf13fce1a
-
SHA256
c8ce5740a8d263c665e0a9117cab7dccf0961ec6cc4d765e7038e6de8f9c111a
-
SHA512
de83412349c077f4569f4b16ee3c7fc7330a89afadfed540d6bc0da84cdf198da2fc8822a95b17868b4bd34c02b5e36774f16e6edec20d23cf167185bfa92ea2
-
SSDEEP
98304:+JfC5u8dO+Nn10conAH3vd2PfevrAAG/tXWs:+mc+D0cc8WWvrXG/t
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1036 new.exe -
Loads dropped DLL 2 IoCs
pid Process 844 tmp.exe 1036 new.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 844 wrote to memory of 1036 844 tmp.exe 29 PID 844 wrote to memory of 1036 844 tmp.exe 29 PID 844 wrote to memory of 1036 844 tmp.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\onefile_844_133323147784130000\new.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5ce3d3957f855b5d9cafd0a9aec446e46
SHA1ac8a5ab1d86b9a4821bb8f8370d2d908a85764bf
SHA256c540fbf92455e359c12e978f7c0da0c2ae18fb31cf83b51cf37a8f73968cc4cc
SHA512e7f02aa06463c97048af089eef982b180d7d5f09f1ca3fa3fa74cf00f9d562ec280425e00f2a44b1ae07430d07d4a94d245eea1bef77d05c02040d1919b020a2
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
Filesize
4.4MB
MD5ce3d3957f855b5d9cafd0a9aec446e46
SHA1ac8a5ab1d86b9a4821bb8f8370d2d908a85764bf
SHA256c540fbf92455e359c12e978f7c0da0c2ae18fb31cf83b51cf37a8f73968cc4cc
SHA512e7f02aa06463c97048af089eef982b180d7d5f09f1ca3fa3fa74cf00f9d562ec280425e00f2a44b1ae07430d07d4a94d245eea1bef77d05c02040d1919b020a2
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9