Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
dc87f491b88cb8exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
dc87f491b88cb8exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
dc87f491b88cb8exeexeexeex.exe
-
Size
90KB
-
MD5
dc87f491b88cb8ae744a0385c700ca6c
-
SHA1
0804cc9c784b22772f13ae5367153d9bdc5d9301
-
SHA256
20d11dd9e3c833d0a19e201eb83eb8dbca41b9d962db4e5769844de934041ad3
-
SHA512
fe0a56bf2cb86e50470011d773c4c4a25f3ad8ee467802a9eaf92fa8f037fe3d1d4af789714b18fd6c51980f7efd2215243333997475512a471e0da3c1aacafb
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWHShlkoIg:V6a+pOtEvwDpjt9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 dc87f491b88cb8exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3028 2232 dc87f491b88cb8exeexeexeex.exe 29 PID 2232 wrote to memory of 3028 2232 dc87f491b88cb8exeexeexeex.exe 29 PID 2232 wrote to memory of 3028 2232 dc87f491b88cb8exeexeexeex.exe 29 PID 2232 wrote to memory of 3028 2232 dc87f491b88cb8exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc87f491b88cb8exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\dc87f491b88cb8exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD56671eadf2cc5c054eb8f59696b459d1d
SHA101cce550ceecb490a1ba08819ba949298542ca70
SHA256db9fe46371560193970fbb8e4a317a11f5e91bfa9225c36a8881aa7dc0b746e9
SHA512a743d401a757501b2cf438bc94f056f0d2ae30e6b8d1d485ef6fb18b4b99f65c5cd461ea8fd9a19d49aadcd14f379a961a5cb4aad6be03f9cd41c8add2e2d2d1
-
Filesize
90KB
MD56671eadf2cc5c054eb8f59696b459d1d
SHA101cce550ceecb490a1ba08819ba949298542ca70
SHA256db9fe46371560193970fbb8e4a317a11f5e91bfa9225c36a8881aa7dc0b746e9
SHA512a743d401a757501b2cf438bc94f056f0d2ae30e6b8d1d485ef6fb18b4b99f65c5cd461ea8fd9a19d49aadcd14f379a961a5cb4aad6be03f9cd41c8add2e2d2d1
-
Filesize
90KB
MD56671eadf2cc5c054eb8f59696b459d1d
SHA101cce550ceecb490a1ba08819ba949298542ca70
SHA256db9fe46371560193970fbb8e4a317a11f5e91bfa9225c36a8881aa7dc0b746e9
SHA512a743d401a757501b2cf438bc94f056f0d2ae30e6b8d1d485ef6fb18b4b99f65c5cd461ea8fd9a19d49aadcd14f379a961a5cb4aad6be03f9cd41c8add2e2d2d1