Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
78008e340f07d5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
78008e340f07d5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
78008e340f07d5exeexeexeex.exe
-
Size
52KB
-
MD5
78008e340f07d56be79d7da1447d669d
-
SHA1
00a0ce3c33c4ebdf0611e845cea623026a48cb63
-
SHA256
d4b689ea58c6218458fdbbcf6735c32254e9c881a4e18de1ee5b86766f841ca6
-
SHA512
4ccff3ab55a201fe7c66af13386479646202e741d4cb7938845ddad2a165d72f5099da4d9603b8de4df443f40fd86f24793c4ba12cc4f964a646aeee8d6dcb55
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxtYzz8j:6j+1NMOtEvwDpjr8ox6zO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1784 78008e340f07d5exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2316 1784 78008e340f07d5exeexeexeex.exe 28 PID 1784 wrote to memory of 2316 1784 78008e340f07d5exeexeexeex.exe 28 PID 1784 wrote to memory of 2316 1784 78008e340f07d5exeexeexeex.exe 28 PID 1784 wrote to memory of 2316 1784 78008e340f07d5exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\78008e340f07d5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\78008e340f07d5exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD51e6295efc3410600fe7406a548246c91
SHA1a97957251f000a9d4a3b2d851e77ba462aac2d26
SHA25692e52b554bd08982eac3f9fefb4fc1117429d37f629ece06c43a3566d669d200
SHA512d237baa9fe52b81db0643316fd1ec386e2e33d4c23bc4fa7c1b21c179f90b01c48c8a6d93d5801493566c98ace3e2cec5bd65dfb5ab2bf7dd078a89206ef98fa
-
Filesize
52KB
MD51e6295efc3410600fe7406a548246c91
SHA1a97957251f000a9d4a3b2d851e77ba462aac2d26
SHA25692e52b554bd08982eac3f9fefb4fc1117429d37f629ece06c43a3566d669d200
SHA512d237baa9fe52b81db0643316fd1ec386e2e33d4c23bc4fa7c1b21c179f90b01c48c8a6d93d5801493566c98ace3e2cec5bd65dfb5ab2bf7dd078a89206ef98fa
-
Filesize
52KB
MD51e6295efc3410600fe7406a548246c91
SHA1a97957251f000a9d4a3b2d851e77ba462aac2d26
SHA25692e52b554bd08982eac3f9fefb4fc1117429d37f629ece06c43a3566d669d200
SHA512d237baa9fe52b81db0643316fd1ec386e2e33d4c23bc4fa7c1b21c179f90b01c48c8a6d93d5801493566c98ace3e2cec5bd65dfb5ab2bf7dd078a89206ef98fa