Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
ce922f19480288exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
ce922f19480288exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ce922f19480288exeexeexeex.exe
-
Size
87KB
-
MD5
ce922f1948028873168efca983000340
-
SHA1
668b39dcccf531a34b98d158eb1fe9fa5a5bef6b
-
SHA256
4967657df699ed51835bbe8b0e6684dc82dde20fa32f4752fb1fb2ee4abfe6f7
-
SHA512
c39d81e94e7afd7cb60173d5488ef11d199ad0b714084db80df6ab2d52d9a2d5df7a66f1e029dc381c7ac315561e28bc29b35d04b666aed3af9f9bb15c431f61
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5H8u8rBN6nqEZNieRpUS6:vCjsIOtEvwDpj5H8zPR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 ce922f19480288exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2360 1984 ce922f19480288exeexeexeex.exe 27 PID 1984 wrote to memory of 2360 1984 ce922f19480288exeexeexeex.exe 27 PID 1984 wrote to memory of 2360 1984 ce922f19480288exeexeexeex.exe 27 PID 1984 wrote to memory of 2360 1984 ce922f19480288exeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce922f19480288exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ce922f19480288exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD504f7bc9f38427385982c9d30216a5634
SHA164d70d3057dca167c7877c65fb18f869236853e6
SHA2564834d33a51be99db40b5a86218ebf8b4c5c1d6a2956a7fc606c8df46e4f730d9
SHA512670b7401e39d36f884fa5f99b77544b369ed567d9b3d076e28fb60515fb95b34734fe3b5da8acbbb5f4f9e76832aed9d5bbdb00245ab7b7f6c40336096397fa8
-
Filesize
87KB
MD504f7bc9f38427385982c9d30216a5634
SHA164d70d3057dca167c7877c65fb18f869236853e6
SHA2564834d33a51be99db40b5a86218ebf8b4c5c1d6a2956a7fc606c8df46e4f730d9
SHA512670b7401e39d36f884fa5f99b77544b369ed567d9b3d076e28fb60515fb95b34734fe3b5da8acbbb5f4f9e76832aed9d5bbdb00245ab7b7f6c40336096397fa8
-
Filesize
87KB
MD504f7bc9f38427385982c9d30216a5634
SHA164d70d3057dca167c7877c65fb18f869236853e6
SHA2564834d33a51be99db40b5a86218ebf8b4c5c1d6a2956a7fc606c8df46e4f730d9
SHA512670b7401e39d36f884fa5f99b77544b369ed567d9b3d076e28fb60515fb95b34734fe3b5da8acbbb5f4f9e76832aed9d5bbdb00245ab7b7f6c40336096397fa8