Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 16:04
Behavioral task
behavioral1
Sample
d1060c60f9f1fdexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d1060c60f9f1fdexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
d1060c60f9f1fdexeexeexeex.exe
-
Size
53KB
-
MD5
d1060c60f9f1fd56e0c1e7d055d370a6
-
SHA1
1182392b9d262253bce29cda23df311da3768ff7
-
SHA256
4201a053d9af339851611bd19c3a05a43c6fe4244c37d8bc95742400624238f0
-
SHA512
5b56fcec659d80eb60abcd123b9253589b9228d6124ab797b2ac147c766668bd6661ac300d62b7be7739fcefef9137e327f9de243797741c430a9da2069132ef
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlOmw:zj+soPSMOtEvwDpj4ktBlg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 d1060c60f9f1fdexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000b000000012296-63.dat upx behavioral1/files/0x000b000000012296-66.dat upx behavioral1/memory/2172-68-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b000000012296-75.dat upx behavioral1/memory/2300-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2300 2172 d1060c60f9f1fdexeexeexeex.exe 28 PID 2172 wrote to memory of 2300 2172 d1060c60f9f1fdexeexeexeex.exe 28 PID 2172 wrote to memory of 2300 2172 d1060c60f9f1fdexeexeexeex.exe 28 PID 2172 wrote to memory of 2300 2172 d1060c60f9f1fdexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1060c60f9f1fdexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\d1060c60f9f1fdexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5d2886282a9f19f706b281391fb9c867c
SHA164e266dda2ec895b3751a86102d716b4630c8a41
SHA2563aab73870cbef2e187c6da4a67b09d09cd14312fa5ba8e24ff9395ec820f0a5c
SHA5122b828ebb81ac92eb91ab8f30049c6dc0c8d9e5bec6a035bcc62cdefd8da9ae383756d461ce566bc09e70f88d1a1f69785d8463ead3acac27480f769c58852b2d
-
Filesize
54KB
MD5d2886282a9f19f706b281391fb9c867c
SHA164e266dda2ec895b3751a86102d716b4630c8a41
SHA2563aab73870cbef2e187c6da4a67b09d09cd14312fa5ba8e24ff9395ec820f0a5c
SHA5122b828ebb81ac92eb91ab8f30049c6dc0c8d9e5bec6a035bcc62cdefd8da9ae383756d461ce566bc09e70f88d1a1f69785d8463ead3acac27480f769c58852b2d
-
Filesize
54KB
MD5d2886282a9f19f706b281391fb9c867c
SHA164e266dda2ec895b3751a86102d716b4630c8a41
SHA2563aab73870cbef2e187c6da4a67b09d09cd14312fa5ba8e24ff9395ec820f0a5c
SHA5122b828ebb81ac92eb91ab8f30049c6dc0c8d9e5bec6a035bcc62cdefd8da9ae383756d461ce566bc09e70f88d1a1f69785d8463ead3acac27480f769c58852b2d