Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
cf36dbbce952fdexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
cf36dbbce952fdexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
cf36dbbce952fdexeexeexeex.exe
-
Size
32KB
-
MD5
cf36dbbce952fdf4e41704e2b13bb1bc
-
SHA1
fa8a30f49144555e98e8ad5962e3bf68e043fc01
-
SHA256
3f5c7808733c29e76b794420ba6729ae6d6ca524e504e57023556279741b6990
-
SHA512
2aa77ff05e6daf3eebc447d400cd54a5d3b77499672ef2b40979f0c8282ad39b63c29d1b98815bb612a34d404b0e183906c2835cbd7c91a1c0925bf66a869d11
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeW00shzG:q0zizzOSxMOtEvwDpj/0dhi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2336 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 cf36dbbce952fdexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2336 2192 cf36dbbce952fdexeexeexeex.exe 27 PID 2192 wrote to memory of 2336 2192 cf36dbbce952fdexeexeexeex.exe 27 PID 2192 wrote to memory of 2336 2192 cf36dbbce952fdexeexeexeex.exe 27 PID 2192 wrote to memory of 2336 2192 cf36dbbce952fdexeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf36dbbce952fdexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\cf36dbbce952fdexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD580d282c5a2076260394d747151f2c42e
SHA1dc6fc23478743f10dceda6cee0b03d6c712b37d3
SHA256824a4cb43c8008fc7b0e3c501a1561a598804f60a41757661d41ae4474d08e89
SHA5123d31dacce291a4893d43d9e3ad420b2e989971ac290ea10e26325df3c9c6e5bd18ea815e2ff1988017ef2112105e7a18b9d74e1c483b0d87be3242fc83a5425d
-
Filesize
32KB
MD580d282c5a2076260394d747151f2c42e
SHA1dc6fc23478743f10dceda6cee0b03d6c712b37d3
SHA256824a4cb43c8008fc7b0e3c501a1561a598804f60a41757661d41ae4474d08e89
SHA5123d31dacce291a4893d43d9e3ad420b2e989971ac290ea10e26325df3c9c6e5bd18ea815e2ff1988017ef2112105e7a18b9d74e1c483b0d87be3242fc83a5425d
-
Filesize
32KB
MD580d282c5a2076260394d747151f2c42e
SHA1dc6fc23478743f10dceda6cee0b03d6c712b37d3
SHA256824a4cb43c8008fc7b0e3c501a1561a598804f60a41757661d41ae4474d08e89
SHA5123d31dacce291a4893d43d9e3ad420b2e989971ac290ea10e26325df3c9c6e5bd18ea815e2ff1988017ef2112105e7a18b9d74e1c483b0d87be3242fc83a5425d