Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 19:45
Behavioral task
behavioral1
Sample
bf420fa90658beexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bf420fa90658beexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
bf420fa90658beexeexeexeex.exe
-
Size
43KB
-
MD5
bf420fa90658bed18451c79f5a6189b3
-
SHA1
4f37928114e133d69a3dab9379eb1b60aa55b0cf
-
SHA256
b3f1c5f4d840ba14b6ebca34b232643487b7f5922e50a36518b5d61f745a7e2e
-
SHA512
660b539728ce265aaf25e75d4c2f99962fc43f67036c058719bb57474b67ffb1915370dcf0f71290a029ce2093817f6613a33b4ac6a112021534bccef2582716
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzfm5oU3tu8/Y:qUmnpomddpMOtEvwDpjjaYaFAh5Nw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2288 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1352 bf420fa90658beexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000d0000000133da-63.dat upx behavioral1/memory/1352-66-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000d0000000133da-67.dat upx behavioral1/files/0x000d0000000133da-75.dat upx behavioral1/memory/2288-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2288 1352 bf420fa90658beexeexeexeex.exe 29 PID 1352 wrote to memory of 2288 1352 bf420fa90658beexeexeexeex.exe 29 PID 1352 wrote to memory of 2288 1352 bf420fa90658beexeexeexeex.exe 29 PID 1352 wrote to memory of 2288 1352 bf420fa90658beexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf420fa90658beexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\bf420fa90658beexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5f21834b713a7e2b5debc20f6f6233346
SHA14277e11c1c7b947a10e12a616d3e0e6d402bc60d
SHA256c2c102513497aa9913be97c616f958d905a5e227d0ed4cd8780c80ea129a1f99
SHA512a895e52b69c824fa3b3b2575bb5c30407aef92dfc4374df612f55a891a0c0084db247427b867d27c6677ecdf2f5ef5bf93af6a114f0c2a91e1d1b734d8e27fc4
-
Filesize
43KB
MD5f21834b713a7e2b5debc20f6f6233346
SHA14277e11c1c7b947a10e12a616d3e0e6d402bc60d
SHA256c2c102513497aa9913be97c616f958d905a5e227d0ed4cd8780c80ea129a1f99
SHA512a895e52b69c824fa3b3b2575bb5c30407aef92dfc4374df612f55a891a0c0084db247427b867d27c6677ecdf2f5ef5bf93af6a114f0c2a91e1d1b734d8e27fc4
-
Filesize
43KB
MD5f21834b713a7e2b5debc20f6f6233346
SHA14277e11c1c7b947a10e12a616d3e0e6d402bc60d
SHA256c2c102513497aa9913be97c616f958d905a5e227d0ed4cd8780c80ea129a1f99
SHA512a895e52b69c824fa3b3b2575bb5c30407aef92dfc4374df612f55a891a0c0084db247427b867d27c6677ecdf2f5ef5bf93af6a114f0c2a91e1d1b734d8e27fc4