Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08-07-2023 17:25
Behavioral task
behavioral1
Sample
8f38f7cd97d245exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8f38f7cd97d245exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8f38f7cd97d245exeexeexeex.exe
-
Size
91KB
-
MD5
8f38f7cd97d245c1556a48a953c01dc6
-
SHA1
ff73e90a0e9c4bc73985a5ad8f1b40339d181702
-
SHA256
61cabdffb20c3f0c7476630d3f294e695a55a823bb52aa77e3d8caaefc7fc430
-
SHA512
7e8d180e9fa0d4963fb0c91c5b98490ba41cc8bf58dbc5ee51edc2e6e30011c770de2bbf7c2653e076e2d111250050c8cade3d1f4cf1b11a5e6babfb845b5366
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjztcS6+:zCsanOtEvwDpjS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1672 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 8f38f7cd97d245exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000d00000001226f-63.dat upx behavioral1/files/0x000d00000001226f-66.dat upx behavioral1/memory/2320-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d00000001226f-75.dat upx behavioral1/memory/1672-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1672 2320 8f38f7cd97d245exeexeexeex.exe 28 PID 2320 wrote to memory of 1672 2320 8f38f7cd97d245exeexeexeex.exe 28 PID 2320 wrote to memory of 1672 2320 8f38f7cd97d245exeexeexeex.exe 28 PID 2320 wrote to memory of 1672 2320 8f38f7cd97d245exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f38f7cd97d245exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8f38f7cd97d245exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD59ca89f440a100f55aac70ab3082d420e
SHA12cefad715f67ddcac537100d7e3d125c789a600c
SHA256658304bffb7c1246b41891a4e9684a44c4b3f3794edf561c9dac2bd5689e6b39
SHA5127594b91f55dd7197e944bb52901a6b40d5460a3639d6e0ba44f5ca4fe14b6aa5f36984933b475b5a92566e9f2cb7a50fcd10ba5c489fb74778893a58d2b2d17f
-
Filesize
91KB
MD59ca89f440a100f55aac70ab3082d420e
SHA12cefad715f67ddcac537100d7e3d125c789a600c
SHA256658304bffb7c1246b41891a4e9684a44c4b3f3794edf561c9dac2bd5689e6b39
SHA5127594b91f55dd7197e944bb52901a6b40d5460a3639d6e0ba44f5ca4fe14b6aa5f36984933b475b5a92566e9f2cb7a50fcd10ba5c489fb74778893a58d2b2d17f
-
Filesize
91KB
MD59ca89f440a100f55aac70ab3082d420e
SHA12cefad715f67ddcac537100d7e3d125c789a600c
SHA256658304bffb7c1246b41891a4e9684a44c4b3f3794edf561c9dac2bd5689e6b39
SHA5127594b91f55dd7197e944bb52901a6b40d5460a3639d6e0ba44f5ca4fe14b6aa5f36984933b475b5a92566e9f2cb7a50fcd10ba5c489fb74778893a58d2b2d17f