Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07-07-2023 12:22
Behavioral task
behavioral1
Sample
481f5ad7541644exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
481f5ad7541644exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
481f5ad7541644exeexeexeex.exe
-
Size
100KB
-
MD5
481f5ad7541644deb1b41b11d88e1f74
-
SHA1
7aac4c6efdc3c61a9d752ea313fcc7075e3a86f4
-
SHA256
dcb968e356e2d662b4a13c4556602efaa0669cbe7e99270764456500c86c76ee
-
SHA512
c723d0b45aed7b17119cda0ed21775f927296602a01af1cde3f87c57df3e57326b39a66f9741a9bbeb096c2726f824aef8fb10194a131609c98b9057f1bb7cfc
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMc/:AnBdOOtEvwDpj6z6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1780 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1816 481f5ad7541644exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000f000000012252-63.dat upx behavioral1/memory/1816-67-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000f000000012252-66.dat upx behavioral1/files/0x000f000000012252-75.dat upx behavioral1/memory/1780-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1780 1816 481f5ad7541644exeexeexeex.exe 29 PID 1816 wrote to memory of 1780 1816 481f5ad7541644exeexeexeex.exe 29 PID 1816 wrote to memory of 1780 1816 481f5ad7541644exeexeexeex.exe 29 PID 1816 wrote to memory of 1780 1816 481f5ad7541644exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\481f5ad7541644exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\481f5ad7541644exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD517749cda560345bb71e47f6e5277e522
SHA18b0a3299857abcbbbcc75cb075f442ba20406a25
SHA256777346c50acb8bc5c48093b6bc5ff48208ae59836e1ead1647f80f5d3dfdc49f
SHA5120ccb23f411cbafac9d49ec499eab92d731d2fb0d5d56bc634a879ed1b4ae276caee8f565a9c2ae15baf8164b43e7bfa4127c564b9a750c1c411161d32f8f218f
-
Filesize
100KB
MD517749cda560345bb71e47f6e5277e522
SHA18b0a3299857abcbbbcc75cb075f442ba20406a25
SHA256777346c50acb8bc5c48093b6bc5ff48208ae59836e1ead1647f80f5d3dfdc49f
SHA5120ccb23f411cbafac9d49ec499eab92d731d2fb0d5d56bc634a879ed1b4ae276caee8f565a9c2ae15baf8164b43e7bfa4127c564b9a750c1c411161d32f8f218f
-
Filesize
100KB
MD517749cda560345bb71e47f6e5277e522
SHA18b0a3299857abcbbbcc75cb075f442ba20406a25
SHA256777346c50acb8bc5c48093b6bc5ff48208ae59836e1ead1647f80f5d3dfdc49f
SHA5120ccb23f411cbafac9d49ec499eab92d731d2fb0d5d56bc634a879ed1b4ae276caee8f565a9c2ae15baf8164b43e7bfa4127c564b9a750c1c411161d32f8f218f