Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
b6f46b6955847aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b6f46b6955847aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
b6f46b6955847aexeexeexeex.exe
-
Size
35KB
-
MD5
b6f46b6955847a61bd707f5bcf83032c
-
SHA1
4f8babd3e38375a97d4db5230eccfad571623e30
-
SHA256
8a0aeffc68476d1348e0b40efc7eda8982e3bfb7947d6b63761351b25d2d9fc2
-
SHA512
d64fbd0f9c46c2e114a15ffa0a5e31708a968c4924808e5dd2c9d650c5f3c4e7d181a2776c4161e612cf5addc31c4e896053bef71bc4be019f1587ae8a733b92
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72DxLq:bgX4zYcgTEu6QOaryfjqDlC76Lq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2200 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 b6f46b6955847aexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2200 2664 b6f46b6955847aexeexeexeex.exe 29 PID 2664 wrote to memory of 2200 2664 b6f46b6955847aexeexeexeex.exe 29 PID 2664 wrote to memory of 2200 2664 b6f46b6955847aexeexeexeex.exe 29 PID 2664 wrote to memory of 2200 2664 b6f46b6955847aexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f46b6955847aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b6f46b6955847aexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD541f22709a612f07cd895f688eeb4a642
SHA1acf3dc49420c5cc5e8756abf6991cacadf062e48
SHA2560dc10db63bfe5b9015f70a2450eb5cbe9f5f712984cd37b9af277c15c7419d8a
SHA512abfe8560ee0f6585c35fe9eeb5e2f01d2fa59c91ba7f295410edfea5398ff1135c168b9bf2e4f73c04839f486da1ccf456c9b7ca8c67bac4f2821a685d71be40
-
Filesize
35KB
MD541f22709a612f07cd895f688eeb4a642
SHA1acf3dc49420c5cc5e8756abf6991cacadf062e48
SHA2560dc10db63bfe5b9015f70a2450eb5cbe9f5f712984cd37b9af277c15c7419d8a
SHA512abfe8560ee0f6585c35fe9eeb5e2f01d2fa59c91ba7f295410edfea5398ff1135c168b9bf2e4f73c04839f486da1ccf456c9b7ca8c67bac4f2821a685d71be40
-
Filesize
35KB
MD541f22709a612f07cd895f688eeb4a642
SHA1acf3dc49420c5cc5e8756abf6991cacadf062e48
SHA2560dc10db63bfe5b9015f70a2450eb5cbe9f5f712984cd37b9af277c15c7419d8a
SHA512abfe8560ee0f6585c35fe9eeb5e2f01d2fa59c91ba7f295410edfea5398ff1135c168b9bf2e4f73c04839f486da1ccf456c9b7ca8c67bac4f2821a685d71be40