Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
7c6e14b35dd62fexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
7c6e14b35dd62fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
7c6e14b35dd62fexeexeexeex.exe
-
Size
35KB
-
MD5
7c6e14b35dd62ff405d729db7a164b09
-
SHA1
8d64bf9b19b9cad55ea2a48809f438baeb672ade
-
SHA256
b25365adcbcd51e43eece9dfa8971a0292a1e80d7a9950e2178a99f05ad5e427
-
SHA512
c5f91f2960d9a0f4e68530597d440b0027d86f29e91a940790eff5321215a119c657edce980d85b727427c74f07d2c83f01bd0c8fb9234dfad795f1e2ad73a21
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+0vJsg5b5Uk:bgX4zYcgTEu6QOaryfjqDlC6JFbKk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 920 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2280 7c6e14b35dd62fexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 920 2280 7c6e14b35dd62fexeexeexeex.exe 27 PID 2280 wrote to memory of 920 2280 7c6e14b35dd62fexeexeexeex.exe 27 PID 2280 wrote to memory of 920 2280 7c6e14b35dd62fexeexeexeex.exe 27 PID 2280 wrote to memory of 920 2280 7c6e14b35dd62fexeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c6e14b35dd62fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\7c6e14b35dd62fexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5d03b8c9d9938609038cd68fcc1c95e34
SHA11ebf33429144abd27da5c87c4827b3f8e2b2e2fe
SHA256410bf5b6374b36b89f59b256f8bb85677091b98c1a60b08189b121a08fd5b725
SHA512e73a662bdfbaabc57d3ec296aa208a5f337ee3592103d3734287a720aefba94154aa8328f66fdc6c0a0c7becddf4bcb628cc2cc90bb1539c9ebd642774b1e0a5
-
Filesize
35KB
MD5d03b8c9d9938609038cd68fcc1c95e34
SHA11ebf33429144abd27da5c87c4827b3f8e2b2e2fe
SHA256410bf5b6374b36b89f59b256f8bb85677091b98c1a60b08189b121a08fd5b725
SHA512e73a662bdfbaabc57d3ec296aa208a5f337ee3592103d3734287a720aefba94154aa8328f66fdc6c0a0c7becddf4bcb628cc2cc90bb1539c9ebd642774b1e0a5
-
Filesize
35KB
MD5d03b8c9d9938609038cd68fcc1c95e34
SHA11ebf33429144abd27da5c87c4827b3f8e2b2e2fe
SHA256410bf5b6374b36b89f59b256f8bb85677091b98c1a60b08189b121a08fd5b725
SHA512e73a662bdfbaabc57d3ec296aa208a5f337ee3592103d3734287a720aefba94154aa8328f66fdc6c0a0c7becddf4bcb628cc2cc90bb1539c9ebd642774b1e0a5