Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 16:32
Behavioral task
behavioral1
Sample
3dc83557dc6a87exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3dc83557dc6a87exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
3dc83557dc6a87exeexeexeex.exe
-
Size
79KB
-
MD5
3dc83557dc6a87bd326b18e3d6775b4f
-
SHA1
d84e4d66379dbc2d859e2802b51e2ebecf849866
-
SHA256
0eae9edc4ab9293669b69423b11f0e77c0c23f371e738bd6143ac3ba5d2e6a40
-
SHA512
4634299254787cef529d87b48e97896ea57fc367a73a27e2886acad77aa450656bd097ed6972923b7996d83c4ec68d4e191612e0e171c8d952ea1a941b90df8e
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUg:1nK6a+qdOOtEvwDpjb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2180 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 3dc83557dc6a87exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000b000000012279-63.dat upx behavioral1/memory/2380-67-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000b000000012279-66.dat upx behavioral1/files/0x000b000000012279-75.dat upx behavioral1/memory/2180-76-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2180 2380 3dc83557dc6a87exeexeexeex.exe 29 PID 2380 wrote to memory of 2180 2380 3dc83557dc6a87exeexeexeex.exe 29 PID 2380 wrote to memory of 2180 2380 3dc83557dc6a87exeexeexeex.exe 29 PID 2380 wrote to memory of 2180 2380 3dc83557dc6a87exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dc83557dc6a87exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\3dc83557dc6a87exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2180
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD53ce16eb1d58b31fe105761568e94c0e0
SHA1f70deaec2f8d267266a80b3ef1e40a8898556552
SHA256c115d8e1b29c788792c1d5be72f42616daf9e102a6742c22afb520cc07c39c91
SHA512fddf4605ce1f0fe4947d4bc5ad597d5a5927b2e4e59634d9c067732dcbe8b1d5b69f3d746380f874a6dd7201590ccbbadc2eae7fba34f75a6ec7a1e4cc1b3f23
-
Filesize
79KB
MD53ce16eb1d58b31fe105761568e94c0e0
SHA1f70deaec2f8d267266a80b3ef1e40a8898556552
SHA256c115d8e1b29c788792c1d5be72f42616daf9e102a6742c22afb520cc07c39c91
SHA512fddf4605ce1f0fe4947d4bc5ad597d5a5927b2e4e59634d9c067732dcbe8b1d5b69f3d746380f874a6dd7201590ccbbadc2eae7fba34f75a6ec7a1e4cc1b3f23
-
Filesize
79KB
MD53ce16eb1d58b31fe105761568e94c0e0
SHA1f70deaec2f8d267266a80b3ef1e40a8898556552
SHA256c115d8e1b29c788792c1d5be72f42616daf9e102a6742c22afb520cc07c39c91
SHA512fddf4605ce1f0fe4947d4bc5ad597d5a5927b2e4e59634d9c067732dcbe8b1d5b69f3d746380f874a6dd7201590ccbbadc2eae7fba34f75a6ec7a1e4cc1b3f23