Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 12:28
Static task
static1
Behavioral task
behavioral1
Sample
28578c337933d4exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
28578c337933d4exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
28578c337933d4exeexeexeex.exe
-
Size
146KB
-
MD5
28578c337933d4ce9abdbcbb4a501f3a
-
SHA1
d2aba8b2217f81d58c4a97c6ad0ed38a3da2fe8a
-
SHA256
0ae4c3e1d7069c4740bfa6d1ca5626f01b415edd64734c988a8702af63e550b3
-
SHA512
26e8edc302d3deaf1e122b61e14a810cf6d517b858e1709ad89e09d0c0dca14755f86d783e3012cbabd683c77ec8c4a16e6cd98fd9ce71e4921db5b764f1dad5
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooNv:V6a+pOtEvwDpjt22D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2072 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 28578c337933d4exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2072 3048 28578c337933d4exeexeexeex.exe 28 PID 3048 wrote to memory of 2072 3048 28578c337933d4exeexeexeex.exe 28 PID 3048 wrote to memory of 2072 3048 28578c337933d4exeexeexeex.exe 28 PID 3048 wrote to memory of 2072 3048 28578c337933d4exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28578c337933d4exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\28578c337933d4exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD57c3010b8d137254071e22db5b48d10cf
SHA12e6786f1cfb9b7fe53ce16742a7daaea9b88f932
SHA25611703807c12e8e0a9a5c472113d212bddabc90a22496d5e0e3d6f95c9c7d9e88
SHA512f983087c00534dcc7518f65118f74805683ea377abd46fb07c230e4f0c2fbf44072dc25308574b752c998ab0b44e1a045b2188df89ae1d7e8a9e0f657b448ed4
-
Filesize
146KB
MD57c3010b8d137254071e22db5b48d10cf
SHA12e6786f1cfb9b7fe53ce16742a7daaea9b88f932
SHA25611703807c12e8e0a9a5c472113d212bddabc90a22496d5e0e3d6f95c9c7d9e88
SHA512f983087c00534dcc7518f65118f74805683ea377abd46fb07c230e4f0c2fbf44072dc25308574b752c998ab0b44e1a045b2188df89ae1d7e8a9e0f657b448ed4
-
Filesize
146KB
MD57c3010b8d137254071e22db5b48d10cf
SHA12e6786f1cfb9b7fe53ce16742a7daaea9b88f932
SHA25611703807c12e8e0a9a5c472113d212bddabc90a22496d5e0e3d6f95c9c7d9e88
SHA512f983087c00534dcc7518f65118f74805683ea377abd46fb07c230e4f0c2fbf44072dc25308574b752c998ab0b44e1a045b2188df89ae1d7e8a9e0f657b448ed4