Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 11:57
Behavioral task
behavioral1
Sample
25874a9350a041exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
25874a9350a041exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
25874a9350a041exeexeexeex.exe
-
Size
119KB
-
MD5
25874a9350a041633d48bff1e98c7b71
-
SHA1
865eb3fcaa671be3e437be80239246cef7106259
-
SHA256
66d02f479a3b7fef0078a56a637f4ae2db69d166c6296563fe92ea4be5385528
-
SHA512
98c0adcf3a5289988ff547f38d53b2ce08dd81d368f5229c2729da4430334b48f4f68336cef05331c20f6bac20779bfa7c6ee9761bd689adc29cf6b3606e6a26
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G/TG4dYET:AnBdOOtEvwDpj6zK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2244 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 296 25874a9350a041exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000c00000001226d-63.dat upx behavioral1/memory/296-67-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000c00000001226d-66.dat upx behavioral1/files/0x000c00000001226d-75.dat upx behavioral1/memory/2244-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 296 wrote to memory of 2244 296 25874a9350a041exeexeexeex.exe 29 PID 296 wrote to memory of 2244 296 25874a9350a041exeexeexeex.exe 29 PID 296 wrote to memory of 2244 296 25874a9350a041exeexeexeex.exe 29 PID 296 wrote to memory of 2244 296 25874a9350a041exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\25874a9350a041exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\25874a9350a041exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2244
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5b7fa7c2c4c7953afce015c433dd91b78
SHA1c600dc033d493c9e4a7215d2bb6153c675e26b08
SHA256edbb72b6e78af97bf4ed4e68db5f35bfbb4218d50a04f729da228d56cbc84f20
SHA512a672e20ba3949780bee261aff4359459c6debd2720d4e752410cb971e9dcdbe3a5aac50361911613c386363d985b1f6e8ed2047b744916ab768d6e89915c96f5
-
Filesize
120KB
MD5b7fa7c2c4c7953afce015c433dd91b78
SHA1c600dc033d493c9e4a7215d2bb6153c675e26b08
SHA256edbb72b6e78af97bf4ed4e68db5f35bfbb4218d50a04f729da228d56cbc84f20
SHA512a672e20ba3949780bee261aff4359459c6debd2720d4e752410cb971e9dcdbe3a5aac50361911613c386363d985b1f6e8ed2047b744916ab768d6e89915c96f5
-
Filesize
120KB
MD5b7fa7c2c4c7953afce015c433dd91b78
SHA1c600dc033d493c9e4a7215d2bb6153c675e26b08
SHA256edbb72b6e78af97bf4ed4e68db5f35bfbb4218d50a04f729da228d56cbc84f20
SHA512a672e20ba3949780bee261aff4359459c6debd2720d4e752410cb971e9dcdbe3a5aac50361911613c386363d985b1f6e8ed2047b744916ab768d6e89915c96f5