Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
c97079047f248dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
c97079047f248dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
c97079047f248dexeexeexeex.exe
-
Size
59KB
-
MD5
c97079047f248da983f1dc49872f2eea
-
SHA1
75dfec1551d7a6df65fd88bef28820af0318707a
-
SHA256
851ee5fcd2c85ce4ce0c7030121386d71f871e1931e1a9c94b80bf57a5220a2d
-
SHA512
35d34e84cf6e605c50eb72c5985656df2e5cad29ec4ae482eb05473feaadbdb7733a64c1c9f8cb31053448cc5e7cff4a3acbd5177fdf515fa5e8cc0512a4d6d9
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HyCyh7vtRJ4BqKb1cKtecZ:vCjsIOtEvwDpj5Hv0q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2068 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 c97079047f248dexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2068 3016 c97079047f248dexeexeexeex.exe 28 PID 3016 wrote to memory of 2068 3016 c97079047f248dexeexeexeex.exe 28 PID 3016 wrote to memory of 2068 3016 c97079047f248dexeexeexeex.exe 28 PID 3016 wrote to memory of 2068 3016 c97079047f248dexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c97079047f248dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\c97079047f248dexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5682356367cd5dadf4bb71cae0d52c7f0
SHA10526ce75cc1fec5ed75130e9e0c147731cba6671
SHA256256755c2f6c01313c8410ee604d984217858eb3bff7b4f3bb4e30ed0725a97ce
SHA5125e8c5b2abb3f70c30dc4b5b060f98c7b3f2083cb7924338032cde6fbb8929f4f0f160b140c10d4f21dfd8092f3c5ccada32aaa6769de4d83e590567dc321be6b
-
Filesize
60KB
MD5682356367cd5dadf4bb71cae0d52c7f0
SHA10526ce75cc1fec5ed75130e9e0c147731cba6671
SHA256256755c2f6c01313c8410ee604d984217858eb3bff7b4f3bb4e30ed0725a97ce
SHA5125e8c5b2abb3f70c30dc4b5b060f98c7b3f2083cb7924338032cde6fbb8929f4f0f160b140c10d4f21dfd8092f3c5ccada32aaa6769de4d83e590567dc321be6b
-
Filesize
60KB
MD5682356367cd5dadf4bb71cae0d52c7f0
SHA10526ce75cc1fec5ed75130e9e0c147731cba6671
SHA256256755c2f6c01313c8410ee604d984217858eb3bff7b4f3bb4e30ed0725a97ce
SHA5125e8c5b2abb3f70c30dc4b5b060f98c7b3f2083cb7924338032cde6fbb8929f4f0f160b140c10d4f21dfd8092f3c5ccada32aaa6769de4d83e590567dc321be6b