Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 17:27
Behavioral task
behavioral1
Sample
1586eed45d4cc3exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1586eed45d4cc3exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
1586eed45d4cc3exeexeexeex.exe
-
Size
95KB
-
MD5
1586eed45d4cc39a77ce6350c4e9a064
-
SHA1
45260bb43b92656e157bc8ed23fd0d94ef3da60c
-
SHA256
8e0f0344a10e22780d2ea3af4055a3afecdb5b5f065e73560f3e0685fba93216
-
SHA512
9d71946fb7da34841de06e072861cf10d1c4c035349a757955098fd6ae198bf71eb58d95973619a7f9cabcfbcf5342a8fc38241df9a4d2bf32822d9b8d6f8c79
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhf:AnBdOOtEvwDpj6z6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2284 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 1586eed45d4cc3exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000f000000012308-63.dat upx behavioral1/memory/2320-66-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000f000000012308-67.dat upx behavioral1/files/0x000f000000012308-75.dat upx behavioral1/memory/2284-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2284 2320 1586eed45d4cc3exeexeexeex.exe 29 PID 2320 wrote to memory of 2284 2320 1586eed45d4cc3exeexeexeex.exe 29 PID 2320 wrote to memory of 2284 2320 1586eed45d4cc3exeexeexeex.exe 29 PID 2320 wrote to memory of 2284 2320 1586eed45d4cc3exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1586eed45d4cc3exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\1586eed45d4cc3exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5fec6f000e1995c8c4a4ea7effaf5aca1
SHA1424fc209440e40109fd3eba8383dd36fc995e9aa
SHA256d100e62c08ae3d08425ac3534bd86428d06c96888cf7966d49795b85ec515f10
SHA5124f0424c8a011e813079ba8f966b478b571964b2b46567123072befc90658b1cd9af654dda052fa46f9c989d5a26c199dd507ad38060f73e834ae44b0f7da9f5b
-
Filesize
95KB
MD5fec6f000e1995c8c4a4ea7effaf5aca1
SHA1424fc209440e40109fd3eba8383dd36fc995e9aa
SHA256d100e62c08ae3d08425ac3534bd86428d06c96888cf7966d49795b85ec515f10
SHA5124f0424c8a011e813079ba8f966b478b571964b2b46567123072befc90658b1cd9af654dda052fa46f9c989d5a26c199dd507ad38060f73e834ae44b0f7da9f5b
-
Filesize
95KB
MD5fec6f000e1995c8c4a4ea7effaf5aca1
SHA1424fc209440e40109fd3eba8383dd36fc995e9aa
SHA256d100e62c08ae3d08425ac3534bd86428d06c96888cf7966d49795b85ec515f10
SHA5124f0424c8a011e813079ba8f966b478b571964b2b46567123072befc90658b1cd9af654dda052fa46f9c989d5a26c199dd507ad38060f73e834ae44b0f7da9f5b