Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 11:24
Static task
static1
Behavioral task
behavioral1
Sample
21568cdcb1e9acexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
21568cdcb1e9acexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
21568cdcb1e9acexeexeexeex.exe
-
Size
29KB
-
MD5
21568cdcb1e9ac4e0f92b67dd684781a
-
SHA1
d00a4650d2987ef91bb7b743fe5421c6541ac545
-
SHA256
2287d9df1d3b4c41a4c59f99663a73ff43f132b810d11447a88dce9ed9fbcd1d
-
SHA512
23404f8fc39bb3bc70f1bef0e3c6b4619c8530506237af0240ec60f968d6822bee6c3d1f493269af964ea239487460fcbda3245cedb64f046b45a951a904280c
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJgKHJ4jHm5Sm:bA74zYcgT/Ekd0ryfjQRSOam4Sm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 21568cdcb1e9acexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2360 1984 21568cdcb1e9acexeexeexeex.exe 27 PID 1984 wrote to memory of 2360 1984 21568cdcb1e9acexeexeexeex.exe 27 PID 1984 wrote to memory of 2360 1984 21568cdcb1e9acexeexeexeex.exe 27 PID 1984 wrote to memory of 2360 1984 21568cdcb1e9acexeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\21568cdcb1e9acexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\21568cdcb1e9acexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD58ee207e509e9eefa7a8fdfc0f0404b8e
SHA171e3c7ea84dc5d8af71a36e15794f8d9def7fcbe
SHA2567e6734df3eaaebdd3e6e21a7c6846ff92b7dbd66121bb1bdcd3a53f48e150a5e
SHA512e954119a007c330c6a1d4477f13fddf104d77b66f3b3615c546e61447c997b9e52b320da63cccadfb86138c85ae4f349d71c0f97b589289de8716ff7d9ef32c5
-
Filesize
30KB
MD58ee207e509e9eefa7a8fdfc0f0404b8e
SHA171e3c7ea84dc5d8af71a36e15794f8d9def7fcbe
SHA2567e6734df3eaaebdd3e6e21a7c6846ff92b7dbd66121bb1bdcd3a53f48e150a5e
SHA512e954119a007c330c6a1d4477f13fddf104d77b66f3b3615c546e61447c997b9e52b320da63cccadfb86138c85ae4f349d71c0f97b589289de8716ff7d9ef32c5
-
Filesize
30KB
MD58ee207e509e9eefa7a8fdfc0f0404b8e
SHA171e3c7ea84dc5d8af71a36e15794f8d9def7fcbe
SHA2567e6734df3eaaebdd3e6e21a7c6846ff92b7dbd66121bb1bdcd3a53f48e150a5e
SHA512e954119a007c330c6a1d4477f13fddf104d77b66f3b3615c546e61447c997b9e52b320da63cccadfb86138c85ae4f349d71c0f97b589289de8716ff7d9ef32c5