Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 11:24
Behavioral task
behavioral1
Sample
772d8f28abf685exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
772d8f28abf685exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
772d8f28abf685exeexeexeex.exe
-
Size
100KB
-
MD5
772d8f28abf685664ace91aaa3e87add
-
SHA1
326277e275a4b245ffcc6965219e0e81a4756e7c
-
SHA256
7beac9a9dcd7b748741758f4677d9b09d20ac55095882f59eb612ad44cd3ce3e
-
SHA512
fd872e51ccbedc6abbcfc9f1330f4ef6f8cbd5f56fb3b8999ac015e1e46b02cad0b9566fad6f178212df865d140e3ec8adaea01097ded20475e3c932e14590f4
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMco4:AnBdOOtEvwDpj6z6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2804 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 772d8f28abf685exeexeexeex.exe -
resource yara_rule behavioral1/memory/3004-66-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000a000000012276-63.dat upx behavioral1/files/0x000a000000012276-67.dat upx behavioral1/files/0x000a000000012276-75.dat upx behavioral1/memory/2804-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2804 3004 772d8f28abf685exeexeexeex.exe 28 PID 3004 wrote to memory of 2804 3004 772d8f28abf685exeexeexeex.exe 28 PID 3004 wrote to memory of 2804 3004 772d8f28abf685exeexeexeex.exe 28 PID 3004 wrote to memory of 2804 3004 772d8f28abf685exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\772d8f28abf685exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\772d8f28abf685exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5563d01b1c7f32b5b10702e4cae408b43
SHA17919172d0089746ffc882f0f25437aa5a46c18ce
SHA256bc6c37b40ab82bcf5cc9310e3df1dd8bc166b44493aa91f56e456686dfd83bc9
SHA512ed87c68d95b33c55efee7025404a6e1c690de5a721c653f603621e77e99c000ea6a380fd6e2116ec7fb32ca414969d6c0ece24995da1df641f016b395b21ae9e
-
Filesize
100KB
MD5563d01b1c7f32b5b10702e4cae408b43
SHA17919172d0089746ffc882f0f25437aa5a46c18ce
SHA256bc6c37b40ab82bcf5cc9310e3df1dd8bc166b44493aa91f56e456686dfd83bc9
SHA512ed87c68d95b33c55efee7025404a6e1c690de5a721c653f603621e77e99c000ea6a380fd6e2116ec7fb32ca414969d6c0ece24995da1df641f016b395b21ae9e
-
Filesize
100KB
MD5563d01b1c7f32b5b10702e4cae408b43
SHA17919172d0089746ffc882f0f25437aa5a46c18ce
SHA256bc6c37b40ab82bcf5cc9310e3df1dd8bc166b44493aa91f56e456686dfd83bc9
SHA512ed87c68d95b33c55efee7025404a6e1c690de5a721c653f603621e77e99c000ea6a380fd6e2116ec7fb32ca414969d6c0ece24995da1df641f016b395b21ae9e