Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230705-en
  • resource tags

    arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 16:17

General

  • Target

    7c6e14b35dd62fexeexeexeex.exe

  • Size

    35KB

  • MD5

    7c6e14b35dd62ff405d729db7a164b09

  • SHA1

    8d64bf9b19b9cad55ea2a48809f438baeb672ade

  • SHA256

    b25365adcbcd51e43eece9dfa8971a0292a1e80d7a9950e2178a99f05ad5e427

  • SHA512

    c5f91f2960d9a0f4e68530597d440b0027d86f29e91a940790eff5321215a119c657edce980d85b727427c74f07d2c83f01bd0c8fb9234dfad795f1e2ad73a21

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+0vJsg5b5Uk:bgX4zYcgTEu6QOaryfjqDlC6JFbKk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c6e14b35dd62fexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\7c6e14b35dd62fexeexeexeex.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    d03b8c9d9938609038cd68fcc1c95e34

    SHA1

    1ebf33429144abd27da5c87c4827b3f8e2b2e2fe

    SHA256

    410bf5b6374b36b89f59b256f8bb85677091b98c1a60b08189b121a08fd5b725

    SHA512

    e73a662bdfbaabc57d3ec296aa208a5f337ee3592103d3734287a720aefba94154aa8328f66fdc6c0a0c7becddf4bcb628cc2cc90bb1539c9ebd642774b1e0a5

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    d03b8c9d9938609038cd68fcc1c95e34

    SHA1

    1ebf33429144abd27da5c87c4827b3f8e2b2e2fe

    SHA256

    410bf5b6374b36b89f59b256f8bb85677091b98c1a60b08189b121a08fd5b725

    SHA512

    e73a662bdfbaabc57d3ec296aa208a5f337ee3592103d3734287a720aefba94154aa8328f66fdc6c0a0c7becddf4bcb628cc2cc90bb1539c9ebd642774b1e0a5

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    d03b8c9d9938609038cd68fcc1c95e34

    SHA1

    1ebf33429144abd27da5c87c4827b3f8e2b2e2fe

    SHA256

    410bf5b6374b36b89f59b256f8bb85677091b98c1a60b08189b121a08fd5b725

    SHA512

    e73a662bdfbaabc57d3ec296aa208a5f337ee3592103d3734287a720aefba94154aa8328f66fdc6c0a0c7becddf4bcb628cc2cc90bb1539c9ebd642774b1e0a5

  • memory/920-68-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2280-54-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2280-55-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB