Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
97446377168211exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
97446377168211exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
97446377168211exeexeexeex.exe
-
Size
31KB
-
MD5
9744637716821173b405ccf700e4425f
-
SHA1
c59394c41bc9060b4e899ead1dc0c32016884d8a
-
SHA256
36a31af3fbee43522fbf6a4aea740de46e1645133add8918bf1f31e98208f04b
-
SHA512
f37b51a7cc81b56a477435201c2093cd22845e97a01897797a85e0ffd8f6dfc9f9aaee6872c3693417fa3071197172c9554a381217814ea8a857f2d522c4b0e3
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpju3FXobM:bAvJCYOOvbRPDEgXVFzpC3FXog
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2380 demka.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 97446377168211exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2336 97446377168211exeexeexeex.exe 2380 demka.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2380 2336 97446377168211exeexeexeex.exe 29 PID 2336 wrote to memory of 2380 2336 97446377168211exeexeexeex.exe 29 PID 2336 wrote to memory of 2380 2336 97446377168211exeexeexeex.exe 29 PID 2336 wrote to memory of 2380 2336 97446377168211exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5fbec228140bd2fa1c21a646918e9029e
SHA1a047128207be40065113a2933f5c79c13b65ab5e
SHA2561cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c
SHA512775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f
-
Filesize
31KB
MD5fbec228140bd2fa1c21a646918e9029e
SHA1a047128207be40065113a2933f5c79c13b65ab5e
SHA2561cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c
SHA512775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f
-
Filesize
31KB
MD5fbec228140bd2fa1c21a646918e9029e
SHA1a047128207be40065113a2933f5c79c13b65ab5e
SHA2561cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c
SHA512775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f