Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 15:34
Behavioral task
behavioral1
Sample
08a02559c01bedexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
08a02559c01bedexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
08a02559c01bedexeexeexeex.exe
-
Size
101KB
-
MD5
08a02559c01bedb26d522e3991e545f3
-
SHA1
5677cc3ff046a19657e3164fbf181c1611af8d8b
-
SHA256
a9f2c493a729433fbba35d3c94b98b218ebced6913f76f0c63ca1731d1f12d15
-
SHA512
193cc02e2442bb11de040e36869c6e96fd61708aaa340d7813b4ef7ed1bdbda9b7bb59f19cb95de8d244da08f6bfffe22cfc210aa4404aefc04ddfff66733951
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMcoJ2:AnBdOOtEvwDpj6zu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2076 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1476 08a02559c01bedexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000c000000012276-63.dat upx behavioral1/files/0x000c000000012276-65.dat upx behavioral1/memory/1476-67-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000c000000012276-75.dat upx behavioral1/memory/2076-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2076 1476 08a02559c01bedexeexeexeex.exe 27 PID 1476 wrote to memory of 2076 1476 08a02559c01bedexeexeexeex.exe 27 PID 1476 wrote to memory of 2076 1476 08a02559c01bedexeexeexeex.exe 27 PID 1476 wrote to memory of 2076 1476 08a02559c01bedexeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\08a02559c01bedexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\08a02559c01bedexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5c12140fed9b9b3b48efd69bbf4447258
SHA1447ce1ad319837181d15de56d13ed736a6f915a0
SHA25658f93aeffdbd3e725f32f09434d67a285308a1fe3d42a56e206bad995ee3d3d0
SHA512f2143561049a0cf28270bedfda8e0a3f89887cd95bffa1778610d1e70987d40bfc04ee8307dad0881d94d79a5444ba16e335e8f711b010726e2643cb73c2a422
-
Filesize
101KB
MD5c12140fed9b9b3b48efd69bbf4447258
SHA1447ce1ad319837181d15de56d13ed736a6f915a0
SHA25658f93aeffdbd3e725f32f09434d67a285308a1fe3d42a56e206bad995ee3d3d0
SHA512f2143561049a0cf28270bedfda8e0a3f89887cd95bffa1778610d1e70987d40bfc04ee8307dad0881d94d79a5444ba16e335e8f711b010726e2643cb73c2a422
-
Filesize
101KB
MD5c12140fed9b9b3b48efd69bbf4447258
SHA1447ce1ad319837181d15de56d13ed736a6f915a0
SHA25658f93aeffdbd3e725f32f09434d67a285308a1fe3d42a56e206bad995ee3d3d0
SHA512f2143561049a0cf28270bedfda8e0a3f89887cd95bffa1778610d1e70987d40bfc04ee8307dad0881d94d79a5444ba16e335e8f711b010726e2643cb73c2a422