Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 16:32
Static task
static1
Behavioral task
behavioral1
Sample
3dc4b41ed482efexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
3dc4b41ed482efexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
3dc4b41ed482efexeexeexeex.exe
-
Size
90KB
-
MD5
3dc4b41ed482efb6a5ff7395b69debad
-
SHA1
27f30d427f9dff4d94ab009be374c1ac53ff2869
-
SHA256
16b85b5b65e89a360ce08ce076c55e5b0dfa4b635c6962bce3e1e20c8c9a4b68
-
SHA512
1462b5178901cc79e5eef4eaa202012cd66279694431470e142047ea358504c821e5ddb8ca5b84c7454133b3e0b8de13fa6b4b542d1b90a7a1f79206c4ddb1bb
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWLm/:V6a+pOtEvwDpjtl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2140 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 3dc4b41ed482efexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2140 2156 3dc4b41ed482efexeexeexeex.exe 27 PID 2156 wrote to memory of 2140 2156 3dc4b41ed482efexeexeexeex.exe 27 PID 2156 wrote to memory of 2140 2156 3dc4b41ed482efexeexeexeex.exe 27 PID 2156 wrote to memory of 2140 2156 3dc4b41ed482efexeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dc4b41ed482efexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\3dc4b41ed482efexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2140
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5023aa1bd32012a6c0657bc821783f71f
SHA190ed5b7c58f2f3bcb33fd44da18b822ab538f31c
SHA256d9e7ae4c9930160c62a39cde6c63e7679cc68d8a4dac062bf1d93bcd61c41e18
SHA512de2e80b39c7f6ecc223af30c6455a48484a01708713f91b0e67fc18446b23f919971bfbc605ea1e44dfbd666600898d28b4bc2b555a144ad617adc93b873e0d7
-
Filesize
90KB
MD5023aa1bd32012a6c0657bc821783f71f
SHA190ed5b7c58f2f3bcb33fd44da18b822ab538f31c
SHA256d9e7ae4c9930160c62a39cde6c63e7679cc68d8a4dac062bf1d93bcd61c41e18
SHA512de2e80b39c7f6ecc223af30c6455a48484a01708713f91b0e67fc18446b23f919971bfbc605ea1e44dfbd666600898d28b4bc2b555a144ad617adc93b873e0d7
-
Filesize
90KB
MD5023aa1bd32012a6c0657bc821783f71f
SHA190ed5b7c58f2f3bcb33fd44da18b822ab538f31c
SHA256d9e7ae4c9930160c62a39cde6c63e7679cc68d8a4dac062bf1d93bcd61c41e18
SHA512de2e80b39c7f6ecc223af30c6455a48484a01708713f91b0e67fc18446b23f919971bfbc605ea1e44dfbd666600898d28b4bc2b555a144ad617adc93b873e0d7