Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
7c40c537d37ef0exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
7c40c537d37ef0exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
7c40c537d37ef0exeexeexeex.exe
-
Size
48KB
-
MD5
7c40c537d37ef00ce091409c03b63ded
-
SHA1
67f0c24c167bc0063f3257d3178e12251f015ff4
-
SHA256
32aed744bb5c53a93ee582d51e59614c1f5c85cb7f4f38560a59ff65e6cf5cf4
-
SHA512
1fdfa1ae0aba9489c896e6b8f2734d8fb4dbfe4658ca71aacc4e2653b6021e2ffd6e69a74ebdf985ad483e2e2cedb5bca8b2ed1a2ca1c864295a33ce6843a42c
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaS2w:V6a+pOtEvwDpjm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 804 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1144 7c40c537d37ef0exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1144 wrote to memory of 804 1144 7c40c537d37ef0exeexeexeex.exe 29 PID 1144 wrote to memory of 804 1144 7c40c537d37ef0exeexeexeex.exe 29 PID 1144 wrote to memory of 804 1144 7c40c537d37ef0exeexeexeex.exe 29 PID 1144 wrote to memory of 804 1144 7c40c537d37ef0exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c40c537d37ef0exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\7c40c537d37ef0exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5bd81b08af33f0064b50166144e3c24d5
SHA140f13014e73fe1004f0df6c3b20e22c05281aa19
SHA256f58755028056039d781432f2546ec1b51763ca313b795846661c9018ee148740
SHA5128d3125b9c5b61830a7c39c66480c98ae0bf26258b60453c6c8bf07582a62c66e831e6f5976ee9dc599c86297ceb971d9af9f66a8c916b761509aa6f6536e473f
-
Filesize
48KB
MD5bd81b08af33f0064b50166144e3c24d5
SHA140f13014e73fe1004f0df6c3b20e22c05281aa19
SHA256f58755028056039d781432f2546ec1b51763ca313b795846661c9018ee148740
SHA5128d3125b9c5b61830a7c39c66480c98ae0bf26258b60453c6c8bf07582a62c66e831e6f5976ee9dc599c86297ceb971d9af9f66a8c916b761509aa6f6536e473f
-
Filesize
48KB
MD5bd81b08af33f0064b50166144e3c24d5
SHA140f13014e73fe1004f0df6c3b20e22c05281aa19
SHA256f58755028056039d781432f2546ec1b51763ca313b795846661c9018ee148740
SHA5128d3125b9c5b61830a7c39c66480c98ae0bf26258b60453c6c8bf07582a62c66e831e6f5976ee9dc599c86297ceb971d9af9f66a8c916b761509aa6f6536e473f