Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 07:56
Behavioral task
behavioral1
Sample
9f03bc7fd7768bexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9f03bc7fd7768bexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9f03bc7fd7768bexeexeexeex.exe
-
Size
64KB
-
MD5
9f03bc7fd7768b1a6c13185053022a39
-
SHA1
678384e6a927a0f1a0f117d5230546749aac2a58
-
SHA256
0de42576c59bd44b608f61a524bc1e9fbfa3eb41b1add26b1b810046f889b427
-
SHA512
90a4623edb7c2e79542d6c4a5e14dfdc3e0e433fbe7c4f963e6736d83646934b2aa3a5510b510f14db5de4705f2ac06e0d89beca7e4c4e8f64dd1694946ce06e
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAh5gD:z6a+CdOOtEvwDpjQJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1628 9f03bc7fd7768bexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000a000000012287-63.dat upx behavioral1/memory/1628-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a000000012287-66.dat upx behavioral1/files/0x000a000000012287-75.dat upx behavioral1/memory/1680-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1680 1628 9f03bc7fd7768bexeexeexeex.exe 28 PID 1628 wrote to memory of 1680 1628 9f03bc7fd7768bexeexeexeex.exe 28 PID 1628 wrote to memory of 1680 1628 9f03bc7fd7768bexeexeexeex.exe 28 PID 1628 wrote to memory of 1680 1628 9f03bc7fd7768bexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f03bc7fd7768bexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9f03bc7fd7768bexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5eb1bb69227f5279fe1c82140013a2d4f
SHA17262ddec4a7cc260d3aec678e548a25df2d23d5e
SHA256a47eb50725f2cda2765cb12115a704bd2f4a790fd5784995a5882b577a8ae838
SHA512b324996ac8a734ee2a1d87a5509977d2b41cf290d95561f3da48853ce79f1203131d0a9d1fcdd178063b5309ec9e6d76e96b9eb2f5e9866bc4cee2d8dc111872
-
Filesize
64KB
MD5eb1bb69227f5279fe1c82140013a2d4f
SHA17262ddec4a7cc260d3aec678e548a25df2d23d5e
SHA256a47eb50725f2cda2765cb12115a704bd2f4a790fd5784995a5882b577a8ae838
SHA512b324996ac8a734ee2a1d87a5509977d2b41cf290d95561f3da48853ce79f1203131d0a9d1fcdd178063b5309ec9e6d76e96b9eb2f5e9866bc4cee2d8dc111872
-
Filesize
64KB
MD5eb1bb69227f5279fe1c82140013a2d4f
SHA17262ddec4a7cc260d3aec678e548a25df2d23d5e
SHA256a47eb50725f2cda2765cb12115a704bd2f4a790fd5784995a5882b577a8ae838
SHA512b324996ac8a734ee2a1d87a5509977d2b41cf290d95561f3da48853ce79f1203131d0a9d1fcdd178063b5309ec9e6d76e96b9eb2f5e9866bc4cee2d8dc111872