Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09-07-2023 16:39
Static task
static1
Behavioral task
behavioral1
Sample
b65707c1ad59f5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b65707c1ad59f5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
b65707c1ad59f5exeexeexeex.exe
-
Size
59KB
-
MD5
b65707c1ad59f543538697173b481381
-
SHA1
193d41b47840636c64b1228242329458352649b7
-
SHA256
bcf8f77be5659c455bbfac39948906f337dfbec9505c1798e6bbf01e1710aca8
-
SHA512
8fab5e2979b94397d4de7b81ac30aaa2ac69b1bfc42d7eb80f5830682ba0e17df331b5b7c872294ed269d36c14f2bc1f41801d48b845ea5e7ee04559d2b9456d
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLY8Cte2:X6a+SOtEvwDpjBrOs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 b65707c1ad59f5exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2392 2312 b65707c1ad59f5exeexeexeex.exe 28 PID 2312 wrote to memory of 2392 2312 b65707c1ad59f5exeexeexeex.exe 28 PID 2312 wrote to memory of 2392 2312 b65707c1ad59f5exeexeexeex.exe 28 PID 2312 wrote to memory of 2392 2312 b65707c1ad59f5exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b65707c1ad59f5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b65707c1ad59f5exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2392
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5a1b1515ff26eea1fe717284f88aff9fd
SHA1df79dd498ed8724efb5efd718920a005f04dbdca
SHA256248e1536827c9f4e2758ae34ed693e7df869e5bc482c1cea2099c2b7de092f48
SHA5120391ba7c5180bc983edacf37fe31abe9e069ba1404cbac65c276a43d03f6472bc5196acdf3f2cb1df5e272533bde9fc3ca5e8333c58e0e4cbaa428c569ff39fe
-
Filesize
59KB
MD5a1b1515ff26eea1fe717284f88aff9fd
SHA1df79dd498ed8724efb5efd718920a005f04dbdca
SHA256248e1536827c9f4e2758ae34ed693e7df869e5bc482c1cea2099c2b7de092f48
SHA5120391ba7c5180bc983edacf37fe31abe9e069ba1404cbac65c276a43d03f6472bc5196acdf3f2cb1df5e272533bde9fc3ca5e8333c58e0e4cbaa428c569ff39fe
-
Filesize
59KB
MD5a1b1515ff26eea1fe717284f88aff9fd
SHA1df79dd498ed8724efb5efd718920a005f04dbdca
SHA256248e1536827c9f4e2758ae34ed693e7df869e5bc482c1cea2099c2b7de092f48
SHA5120391ba7c5180bc983edacf37fe31abe9e069ba1404cbac65c276a43d03f6472bc5196acdf3f2cb1df5e272533bde9fc3ca5e8333c58e0e4cbaa428c569ff39fe