Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
aeaace8d8d21efexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
aeaace8d8d21efexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
aeaace8d8d21efexeexeexeex.exe
-
Size
103KB
-
MD5
aeaace8d8d21ef7c5dc054adc9bae71b
-
SHA1
0057b76ea52ec90b73f3a7ccd2caf864461a95ec
-
SHA256
d60fbb8e4edb577b4045401f6d4aae3645ae279af19068ac71be4e56a50d49f3
-
SHA512
ee23ab9d9848433f8d9ae0142a5d4e42c10c36ebbb385449a5140ca35f31783e202a13ccc496490498c79608d838e28773440cd4d461d032579008ee2ef2921b
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWCCyDLKASkjoBFB:xj+VGMOtEvwDpjubwQEIie8+ASkk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2292 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 aeaace8d8d21efexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2292 2316 aeaace8d8d21efexeexeexeex.exe 28 PID 2316 wrote to memory of 2292 2316 aeaace8d8d21efexeexeexeex.exe 28 PID 2316 wrote to memory of 2292 2316 aeaace8d8d21efexeexeexeex.exe 28 PID 2316 wrote to memory of 2292 2316 aeaace8d8d21efexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aeaace8d8d21efexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\aeaace8d8d21efexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD54d724a38a70ec7c93b66c8ab97fb05af
SHA179d283f214947fad84b05003851345d19b754db3
SHA256389e7e9a38fad19e963e71ea42b1f0dcc4f0e7b710555179b96f6a83580c3978
SHA5122d29615af3d64995d3f6305aa5a0f6242e1fdb2af4d635a385b081ad4825632c97d6b90f95d2b798a0e8f9762a072c5cfc295611785796bd8f653e5e905cc710
-
Filesize
103KB
MD54d724a38a70ec7c93b66c8ab97fb05af
SHA179d283f214947fad84b05003851345d19b754db3
SHA256389e7e9a38fad19e963e71ea42b1f0dcc4f0e7b710555179b96f6a83580c3978
SHA5122d29615af3d64995d3f6305aa5a0f6242e1fdb2af4d635a385b081ad4825632c97d6b90f95d2b798a0e8f9762a072c5cfc295611785796bd8f653e5e905cc710
-
Filesize
103KB
MD54d724a38a70ec7c93b66c8ab97fb05af
SHA179d283f214947fad84b05003851345d19b754db3
SHA256389e7e9a38fad19e963e71ea42b1f0dcc4f0e7b710555179b96f6a83580c3978
SHA5122d29615af3d64995d3f6305aa5a0f6242e1fdb2af4d635a385b081ad4825632c97d6b90f95d2b798a0e8f9762a072c5cfc295611785796bd8f653e5e905cc710