Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 15:18
Static task
static1
Behavioral task
behavioral1
Sample
35cd99719a0567exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
35cd99719a0567exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
35cd99719a0567exeexeexeex.exe
-
Size
66KB
-
MD5
35cd99719a056772b61f8a4ba1a1356f
-
SHA1
248535e77c813750d5c30164b0fa997ce13c91d1
-
SHA256
c5c7bac7c9305a77c9c1f03370f23a558a291be96567f666c38e79d07a729da1
-
SHA512
1523a400c0519dad1680c92fc28fe5969501b09cff255382c67c397465c03ef4960027534d1fcc3f405407d6ed94383d33d446962e55013af3f56638b2b8f332
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ36n9F+Uk+gT:ZVxkGOtEvwDpjcaAPM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1020 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2824 35cd99719a0567exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1020 2824 35cd99719a0567exeexeexeex.exe 27 PID 2824 wrote to memory of 1020 2824 35cd99719a0567exeexeexeex.exe 27 PID 2824 wrote to memory of 1020 2824 35cd99719a0567exeexeexeex.exe 27 PID 2824 wrote to memory of 1020 2824 35cd99719a0567exeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\35cd99719a0567exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\35cd99719a0567exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5ded3b6ed4cc855bcc981dc8778bb4b13
SHA139a1d656bd14e768045594eb4cd7b384e3ad417b
SHA256e8f3b296cc48e587db896487da97bce5c5943bf02d6663f2e64a158cd2b10f7f
SHA51212ca54a8326bc99bc20951bbf481d610a1607f75c98eb8fe2d585a888536cbc0d2768948bb3f8ca059040606d8928c074ae94f1c2ac4b1e82699f2e0459e8972
-
Filesize
67KB
MD5ded3b6ed4cc855bcc981dc8778bb4b13
SHA139a1d656bd14e768045594eb4cd7b384e3ad417b
SHA256e8f3b296cc48e587db896487da97bce5c5943bf02d6663f2e64a158cd2b10f7f
SHA51212ca54a8326bc99bc20951bbf481d610a1607f75c98eb8fe2d585a888536cbc0d2768948bb3f8ca059040606d8928c074ae94f1c2ac4b1e82699f2e0459e8972
-
Filesize
67KB
MD5ded3b6ed4cc855bcc981dc8778bb4b13
SHA139a1d656bd14e768045594eb4cd7b384e3ad417b
SHA256e8f3b296cc48e587db896487da97bce5c5943bf02d6663f2e64a158cd2b10f7f
SHA51212ca54a8326bc99bc20951bbf481d610a1607f75c98eb8fe2d585a888536cbc0d2768948bb3f8ca059040606d8928c074ae94f1c2ac4b1e82699f2e0459e8972