Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
b3b2664e39ce23exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b3b2664e39ce23exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
b3b2664e39ce23exeexeexeex.exe
-
Size
42KB
-
MD5
b3b2664e39ce23128c61e3056d317cb6
-
SHA1
470e05ba244583bd3b4729899eb076648c989a88
-
SHA256
13817f79224197121c3ecd9a6326387b3108d3d153f60de2a912f0106aecda34
-
SHA512
2ef973360df08e21e3d001f9e74c45a4346fea0d4c11ad13b0f04bd98b60ca9f236dd7a9c4c94b0476251b209ec581a45b411bdf4eab5789d7a4e4350202883d
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg9AeWwQEhFGZM:bxNrC7kYo1Fxf2el+M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2244 pissa.exe -
Loads dropped DLL 1 IoCs
pid Process 296 b3b2664e39ce23exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 296 wrote to memory of 2244 296 b3b2664e39ce23exeexeexeex.exe 29 PID 296 wrote to memory of 2244 296 b3b2664e39ce23exeexeexeex.exe 29 PID 296 wrote to memory of 2244 296 b3b2664e39ce23exeexeexeex.exe 29 PID 296 wrote to memory of 2244 296 b3b2664e39ce23exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3b2664e39ce23exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b3b2664e39ce23exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
PID:2244
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD547f257027a1885c9b12146f4150dfd9c
SHA1db5e41b3b3c1ccacd39fefe8be085bb843e4e42d
SHA25644f7a6ada22fe95864fe7e0b5e264f814e71bf07d20cc576cf8f4418881664a1
SHA51214661e185526dedbc3a453b9b24bd05c8ab3b5e7ed9b8c84122fed533e4a93521a2a2216de12197de519b383afd89aac8c341c6b219d98af24a8f4235303530b
-
Filesize
42KB
MD547f257027a1885c9b12146f4150dfd9c
SHA1db5e41b3b3c1ccacd39fefe8be085bb843e4e42d
SHA25644f7a6ada22fe95864fe7e0b5e264f814e71bf07d20cc576cf8f4418881664a1
SHA51214661e185526dedbc3a453b9b24bd05c8ab3b5e7ed9b8c84122fed533e4a93521a2a2216de12197de519b383afd89aac8c341c6b219d98af24a8f4235303530b
-
Filesize
42KB
MD547f257027a1885c9b12146f4150dfd9c
SHA1db5e41b3b3c1ccacd39fefe8be085bb843e4e42d
SHA25644f7a6ada22fe95864fe7e0b5e264f814e71bf07d20cc576cf8f4418881664a1
SHA51214661e185526dedbc3a453b9b24bd05c8ab3b5e7ed9b8c84122fed533e4a93521a2a2216de12197de519b383afd89aac8c341c6b219d98af24a8f4235303530b