Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 12:36
Behavioral task
behavioral1
Sample
29436bd7b8ddc5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
29436bd7b8ddc5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
29436bd7b8ddc5exeexeexeex.exe
-
Size
80KB
-
MD5
29436bd7b8ddc5bffe19dae2fc044ddf
-
SHA1
340e466b3b6691ba34471fa2949e27c33aa72e08
-
SHA256
b46066eaf30f2a9c013efde40db76fd1966d113e4d533758e516be44a2faa305
-
SHA512
d4003fcbe9db22cd4e2aae42a7637e25a59035fa67071f23941c2199397141bd01ea8b595d92ef72a9f40c0eccbfeba7c102124feee8bad2c6ba0d32682006bb
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUCo:1nK6a+qdOOtEvwDpjm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 29436bd7b8ddc5exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000a00000001225d-63.dat upx behavioral1/memory/2872-67-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a00000001225d-66.dat upx behavioral1/files/0x000a00000001225d-75.dat upx behavioral1/memory/2212-76-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2212 2872 29436bd7b8ddc5exeexeexeex.exe 29 PID 2872 wrote to memory of 2212 2872 29436bd7b8ddc5exeexeexeex.exe 29 PID 2872 wrote to memory of 2212 2872 29436bd7b8ddc5exeexeexeex.exe 29 PID 2872 wrote to memory of 2212 2872 29436bd7b8ddc5exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\29436bd7b8ddc5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\29436bd7b8ddc5exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5a5f827708dfea650a32814d920f543ae
SHA1c72608bd8eebeaf169c8c83efd2149b6d350baab
SHA25672cc664f5159af14a1bbaf95dfd2ff05e2c308e6940dd49d74e813913eb37bc7
SHA51284984f3a84630138ffc81b2c785182ab9837606209b9e54dc68cf75b42884c94a2faff76aee4f892ac3cc01b9192aef0baf71f8a0379e668ad51b13b06c29757
-
Filesize
81KB
MD5a5f827708dfea650a32814d920f543ae
SHA1c72608bd8eebeaf169c8c83efd2149b6d350baab
SHA25672cc664f5159af14a1bbaf95dfd2ff05e2c308e6940dd49d74e813913eb37bc7
SHA51284984f3a84630138ffc81b2c785182ab9837606209b9e54dc68cf75b42884c94a2faff76aee4f892ac3cc01b9192aef0baf71f8a0379e668ad51b13b06c29757
-
Filesize
81KB
MD5a5f827708dfea650a32814d920f543ae
SHA1c72608bd8eebeaf169c8c83efd2149b6d350baab
SHA25672cc664f5159af14a1bbaf95dfd2ff05e2c308e6940dd49d74e813913eb37bc7
SHA51284984f3a84630138ffc81b2c785182ab9837606209b9e54dc68cf75b42884c94a2faff76aee4f892ac3cc01b9192aef0baf71f8a0379e668ad51b13b06c29757