Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 09:26
Behavioral task
behavioral1
Sample
a9fb329dd493dcexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
a9fb329dd493dcexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
a9fb329dd493dcexeexeexeex.exe
-
Size
139KB
-
MD5
a9fb329dd493dc2e0cf5b56a3459825a
-
SHA1
85800c24779f7165cd7fd562954e97c2cad77458
-
SHA256
19c80d24b7410a444081f2110c0f6354e079a9a5f3814f1cdb7bd8805432f82d
-
SHA512
9090a1022d670d6a32fbc6ab22cd619d514b775c3f1b1e9efdbdcb2e13854a6eee191c735cdedf2ce81b7c50b592405342d10942121f323ea33674c0895962e6
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GjZL:z6a+CdOOtEvwDpjczg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 992 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1204 a9fb329dd493dcexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000a00000001225a-63.dat upx behavioral1/files/0x000a00000001225a-66.dat upx behavioral1/memory/1204-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a00000001225a-75.dat upx behavioral1/memory/992-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 992 1204 a9fb329dd493dcexeexeexeex.exe 29 PID 1204 wrote to memory of 992 1204 a9fb329dd493dcexeexeexeex.exe 29 PID 1204 wrote to memory of 992 1204 a9fb329dd493dcexeexeexeex.exe 29 PID 1204 wrote to memory of 992 1204 a9fb329dd493dcexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9fb329dd493dcexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\a9fb329dd493dcexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5f0c1c3527f229039abd2f846cf628757
SHA1f7203e5da6e8ea6597ac7b6c7c57099d8cf02301
SHA256511c7d5398d6f27fff651f5ad3bda7096861900cf830a677db2e6553ed174ad6
SHA51287d8ffc42a30dd20aae6d78dbfd708102e0165fb4e1fe7864a13901bcb10aa18b930951da3bc535f2777526c9cfa2b8237b0fb046b7ab971b140b1c8ebfd551d
-
Filesize
139KB
MD5f0c1c3527f229039abd2f846cf628757
SHA1f7203e5da6e8ea6597ac7b6c7c57099d8cf02301
SHA256511c7d5398d6f27fff651f5ad3bda7096861900cf830a677db2e6553ed174ad6
SHA51287d8ffc42a30dd20aae6d78dbfd708102e0165fb4e1fe7864a13901bcb10aa18b930951da3bc535f2777526c9cfa2b8237b0fb046b7ab971b140b1c8ebfd551d
-
Filesize
139KB
MD5f0c1c3527f229039abd2f846cf628757
SHA1f7203e5da6e8ea6597ac7b6c7c57099d8cf02301
SHA256511c7d5398d6f27fff651f5ad3bda7096861900cf830a677db2e6553ed174ad6
SHA51287d8ffc42a30dd20aae6d78dbfd708102e0165fb4e1fe7864a13901bcb10aa18b930951da3bc535f2777526c9cfa2b8237b0fb046b7ab971b140b1c8ebfd551d