Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 20:24
Behavioral task
behavioral1
Sample
206fd93417bdf7exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
206fd93417bdf7exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
206fd93417bdf7exeexeexeex.exe
-
Size
95KB
-
MD5
206fd93417bdf71b7ca936542514a364
-
SHA1
bffb97745c61f65e9d796724e623cbe6b0a84624
-
SHA256
cd288a403d4dbe16717e26e7ccd2cbbc4dc01b1cc6212351c3389a9cd6aa2803
-
SHA512
652d3513aa58bb6a3d3577450e7466a22df7e7fa3641c72136b6ac042ac4a71d5ca62490438a5b82140c848a1386814ffc249cb4af61f1bee1442d4c50fff3aa
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJh8v:AnBdOOtEvwDpj6zP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1832 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1360 206fd93417bdf7exeexeexeex.exe -
resource yara_rule behavioral1/files/0x003c00000000f60a-63.dat upx behavioral1/files/0x003c00000000f60a-66.dat upx behavioral1/memory/1360-67-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x003c00000000f60a-75.dat upx behavioral1/memory/1832-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1832 1360 206fd93417bdf7exeexeexeex.exe 28 PID 1360 wrote to memory of 1832 1360 206fd93417bdf7exeexeexeex.exe 28 PID 1360 wrote to memory of 1832 1360 206fd93417bdf7exeexeexeex.exe 28 PID 1360 wrote to memory of 1832 1360 206fd93417bdf7exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\206fd93417bdf7exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\206fd93417bdf7exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD55e489e464050ed7b7de76b9f4d3ecd5d
SHA152cb167d184fc94c2dcfd9c9b93d75de423d5895
SHA25692cb14cb6394311816717e5b1c8b2271dec6d43daaf1d017ca8c1f3c49ab3041
SHA5129f3a778f71babab280a128ee28717720e5a62a85c4aec8e1a0f444a95c404b327b5e3dbd435ba561afbaa94389a8a724896c6261a701c9e3559e0f00bef7aae9
-
Filesize
95KB
MD55e489e464050ed7b7de76b9f4d3ecd5d
SHA152cb167d184fc94c2dcfd9c9b93d75de423d5895
SHA25692cb14cb6394311816717e5b1c8b2271dec6d43daaf1d017ca8c1f3c49ab3041
SHA5129f3a778f71babab280a128ee28717720e5a62a85c4aec8e1a0f444a95c404b327b5e3dbd435ba561afbaa94389a8a724896c6261a701c9e3559e0f00bef7aae9
-
Filesize
95KB
MD55e489e464050ed7b7de76b9f4d3ecd5d
SHA152cb167d184fc94c2dcfd9c9b93d75de423d5895
SHA25692cb14cb6394311816717e5b1c8b2271dec6d43daaf1d017ca8c1f3c49ab3041
SHA5129f3a778f71babab280a128ee28717720e5a62a85c4aec8e1a0f444a95c404b327b5e3dbd435ba561afbaa94389a8a724896c6261a701c9e3559e0f00bef7aae9