Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 16:46
Behavioral task
behavioral1
Sample
118be8026c733fexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
118be8026c733fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
118be8026c733fexeexeexeex.exe
-
Size
57KB
-
MD5
118be8026c733f4270500004ff990efc
-
SHA1
735c7c8f38223ad8e4c3b7eb958e256064d1b182
-
SHA256
0278257203a485bf4c140a8c09e92f47b41579082fe62f898fc89c35de99071f
-
SHA512
d01a71674ddcc42c4eaeb70b43d45913f8018c30a412d5ff5d9e59b9d2e300bb871a3b224af2d2df776369dc65a839eece1b32571cdab1b961b029c429d58f3b
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTFH39y:T6a+rdOOtEvwDpjNM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1328 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 118be8026c733fexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000d000000012242-63.dat upx behavioral1/files/0x000d000000012242-65.dat upx behavioral1/memory/2336-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d000000012242-75.dat upx behavioral1/memory/1328-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1328 2336 118be8026c733fexeexeexeex.exe 28 PID 2336 wrote to memory of 1328 2336 118be8026c733fexeexeexeex.exe 28 PID 2336 wrote to memory of 1328 2336 118be8026c733fexeexeexeex.exe 28 PID 2336 wrote to memory of 1328 2336 118be8026c733fexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\118be8026c733fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\118be8026c733fexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD51f32e60a41be7282431bdcea39e51a82
SHA12a21f1b9440c36463e9d452ac47ba9e8ac891984
SHA256828259e2d1cad88cf8d2342e5d211f4824d88c077c97d1518f12c6b30da9beb0
SHA5126062f9bf04dac1bd1fa3c7f8f5f7c71d9885a8f2ad64d9c01b8e98bf1e4fa6349c9da24f9dbbf345a66132824549362dd2a45a5e8fa9b3ee9f6fcbf24fca4380
-
Filesize
57KB
MD51f32e60a41be7282431bdcea39e51a82
SHA12a21f1b9440c36463e9d452ac47ba9e8ac891984
SHA256828259e2d1cad88cf8d2342e5d211f4824d88c077c97d1518f12c6b30da9beb0
SHA5126062f9bf04dac1bd1fa3c7f8f5f7c71d9885a8f2ad64d9c01b8e98bf1e4fa6349c9da24f9dbbf345a66132824549362dd2a45a5e8fa9b3ee9f6fcbf24fca4380
-
Filesize
57KB
MD51f32e60a41be7282431bdcea39e51a82
SHA12a21f1b9440c36463e9d452ac47ba9e8ac891984
SHA256828259e2d1cad88cf8d2342e5d211f4824d88c077c97d1518f12c6b30da9beb0
SHA5126062f9bf04dac1bd1fa3c7f8f5f7c71d9885a8f2ad64d9c01b8e98bf1e4fa6349c9da24f9dbbf345a66132824549362dd2a45a5e8fa9b3ee9f6fcbf24fca4380