Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 17:32
Behavioral task
behavioral1
Sample
16026356611632exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
16026356611632exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
16026356611632exeexeexeex.exe
-
Size
140KB
-
MD5
16026356611632f557c42df63e1b5a55
-
SHA1
dd89e39f8f5cc4cdb5c84e56a5a4b053d2a354ce
-
SHA256
85d1292891bd7d39fe3758995a547f9671f868b57f2ee4c23dff2b87a3633a27
-
SHA512
2b14dbf2eae9e6ef80c4bfc37795db537497181d6d43ba3b09b6c016e4957fc7f4ff6067642560c102838713d89d194f2184782e69086f81d6e7dc5a7d04d63a
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699Gjr0BSv:z6a+CdOOtEvwDpjczC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3024 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3064 16026356611632exeexeexeex.exe -
resource yara_rule behavioral1/files/0x0008000000012111-63.dat upx behavioral1/files/0x0008000000012111-66.dat upx behavioral1/memory/3064-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0008000000012111-75.dat upx behavioral1/memory/3024-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3024 3064 16026356611632exeexeexeex.exe 27 PID 3064 wrote to memory of 3024 3064 16026356611632exeexeexeex.exe 27 PID 3064 wrote to memory of 3024 3064 16026356611632exeexeexeex.exe 27 PID 3064 wrote to memory of 3024 3064 16026356611632exeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\16026356611632exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\16026356611632exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD53ecb11e52bf3193948100896ef1edbe1
SHA194933e2db85e76d275b3531421b89a6c1b9fec50
SHA256a6100f098974be405ec74e065f9349ed875734634fff5457d7c062c508ecc91d
SHA51239bd3d12fd9080de03c290f0f2043b1eba2c6a5f46cda2626bc9b265ef499ca63cf21d0e04c44c727af76621f7186fd5895b22005aaaa3349500733ac2784d18
-
Filesize
140KB
MD53ecb11e52bf3193948100896ef1edbe1
SHA194933e2db85e76d275b3531421b89a6c1b9fec50
SHA256a6100f098974be405ec74e065f9349ed875734634fff5457d7c062c508ecc91d
SHA51239bd3d12fd9080de03c290f0f2043b1eba2c6a5f46cda2626bc9b265ef499ca63cf21d0e04c44c727af76621f7186fd5895b22005aaaa3349500733ac2784d18
-
Filesize
140KB
MD53ecb11e52bf3193948100896ef1edbe1
SHA194933e2db85e76d275b3531421b89a6c1b9fec50
SHA256a6100f098974be405ec74e065f9349ed875734634fff5457d7c062c508ecc91d
SHA51239bd3d12fd9080de03c290f0f2043b1eba2c6a5f46cda2626bc9b265ef499ca63cf21d0e04c44c727af76621f7186fd5895b22005aaaa3349500733ac2784d18