Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08-07-2023 11:30
Behavioral task
behavioral1
Sample
7817603c94cf3aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
7817603c94cf3aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
7817603c94cf3aexeexeexeex.exe
-
Size
87KB
-
MD5
7817603c94cf3a356ea35baf889e5df8
-
SHA1
c23d2c23742dfd15281e81c64458c66a161957bb
-
SHA256
43e624b170a8a02b7086daa320a33d35f85238e445d520a3df731781c1dd9dd3
-
SHA512
61d1020b71ce7510146baa7d0d8902eb9a6f53d0049f161b4dd0ab7d93dd3a7ace09e8e66313836244f13459a69838629fd88a0c7d32234ed126ca31161c1fc0
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDSEoI:zCsanOtEvwDpjw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3044 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1616 7817603c94cf3aexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000c000000012279-63.dat upx behavioral1/memory/1616-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c000000012279-66.dat upx behavioral1/files/0x000c000000012279-75.dat upx behavioral1/memory/3044-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3044 1616 7817603c94cf3aexeexeexeex.exe 28 PID 1616 wrote to memory of 3044 1616 7817603c94cf3aexeexeexeex.exe 28 PID 1616 wrote to memory of 3044 1616 7817603c94cf3aexeexeexeex.exe 28 PID 1616 wrote to memory of 3044 1616 7817603c94cf3aexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7817603c94cf3aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\7817603c94cf3aexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5fddae5fbab3f43af77b207ea9b674812
SHA162bf4738c92d553ea238bd44b3615aee169ecfa3
SHA256a68cb8e9c0c97b246cb41ee3ec5725ce9732ded4de23bd2b35e14fd229ca6044
SHA5127b62d2d7ad1e5efa0ba29530036b8983e83f4cacfdfbe8222c0d5bc4a0f497eae063746ea417a52fa7748c6ec4916d820bc56a8f07e20edd7067d034c73d1a8a
-
Filesize
87KB
MD5fddae5fbab3f43af77b207ea9b674812
SHA162bf4738c92d553ea238bd44b3615aee169ecfa3
SHA256a68cb8e9c0c97b246cb41ee3ec5725ce9732ded4de23bd2b35e14fd229ca6044
SHA5127b62d2d7ad1e5efa0ba29530036b8983e83f4cacfdfbe8222c0d5bc4a0f497eae063746ea417a52fa7748c6ec4916d820bc56a8f07e20edd7067d034c73d1a8a
-
Filesize
87KB
MD5fddae5fbab3f43af77b207ea9b674812
SHA162bf4738c92d553ea238bd44b3615aee169ecfa3
SHA256a68cb8e9c0c97b246cb41ee3ec5725ce9732ded4de23bd2b35e14fd229ca6044
SHA5127b62d2d7ad1e5efa0ba29530036b8983e83f4cacfdfbe8222c0d5bc4a0f497eae063746ea417a52fa7748c6ec4916d820bc56a8f07e20edd7067d034c73d1a8a