Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
309c78b9237b0eexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
309c78b9237b0eexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
309c78b9237b0eexeexeexeex.exe
-
Size
56KB
-
MD5
309c78b9237b0e6af227d70eb7cb6b6b
-
SHA1
141f8c3d248aef70ab8239db8e06581bbafeeb60
-
SHA256
622cae89aeee159c2bc7ed730656f616f2a848e6c493fcffe00cc6f934619f7b
-
SHA512
d72f897f0ee869507f30996e12879623cea0486cb4bc71345aea55912b551ffcbcc960a3f0b723eb79b5eecc25256710e02d6e50d294fe8f23f58ac416dd8868
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8lB4dCOBy/cMFqeo9e1KfzH4:ZzFbxmLPWQMOtEvwDpj38lD/cMAPjH4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 309c78b9237b0eexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2236 3012 309c78b9237b0eexeexeexeex.exe 27 PID 3012 wrote to memory of 2236 3012 309c78b9237b0eexeexeexeex.exe 27 PID 3012 wrote to memory of 2236 3012 309c78b9237b0eexeexeexeex.exe 27 PID 3012 wrote to memory of 2236 3012 309c78b9237b0eexeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\309c78b9237b0eexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\309c78b9237b0eexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2236
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD52a9e0151bc609c766b045ddf11bca5f4
SHA1ad621ba42336f22d67bfeb1cf3af34c13d742209
SHA2561fe9ddc055348a3c969e21609ea3485accb33a2e2a54561b416155420af32ad9
SHA512ff648f9977c294910a4f7b60c11ae3e958522d8b73d9b5ce70062b8768cc36616d58b652d95fdf8d726321a45b4609b66403628e05c5faa7384d5a184238adc3
-
Filesize
56KB
MD52a9e0151bc609c766b045ddf11bca5f4
SHA1ad621ba42336f22d67bfeb1cf3af34c13d742209
SHA2561fe9ddc055348a3c969e21609ea3485accb33a2e2a54561b416155420af32ad9
SHA512ff648f9977c294910a4f7b60c11ae3e958522d8b73d9b5ce70062b8768cc36616d58b652d95fdf8d726321a45b4609b66403628e05c5faa7384d5a184238adc3
-
Filesize
56KB
MD52a9e0151bc609c766b045ddf11bca5f4
SHA1ad621ba42336f22d67bfeb1cf3af34c13d742209
SHA2561fe9ddc055348a3c969e21609ea3485accb33a2e2a54561b416155420af32ad9
SHA512ff648f9977c294910a4f7b60c11ae3e958522d8b73d9b5ce70062b8768cc36616d58b652d95fdf8d726321a45b4609b66403628e05c5faa7384d5a184238adc3