Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
d8bec3f923f1c9exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d8bec3f923f1c9exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
d8bec3f923f1c9exeexeexeex.exe
-
Size
29KB
-
MD5
d8bec3f923f1c9c9c783049f38124a50
-
SHA1
d612aebbd96712e8dacbac1dd199fa97a75bc2ff
-
SHA256
c5571b9443ad68baca654b5607b6b6db7c576bea310716b274fd3287dbfa90ec
-
SHA512
f3e754549dddea955d74b1ac817543ca09b3828cd0ddd3c2c1b063c5418592f94a9066430596b4b50430b6021bf06d6ff5e78911460f1a717f92022f0132a757
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUZ0psObGqWBv0dOeFL:bA74zYcgT/Ekd0ryfjeRtBsdOeFL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2248 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2428 d8bec3f923f1c9exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2248 2428 d8bec3f923f1c9exeexeexeex.exe 28 PID 2428 wrote to memory of 2248 2428 d8bec3f923f1c9exeexeexeex.exe 28 PID 2428 wrote to memory of 2248 2428 d8bec3f923f1c9exeexeexeex.exe 28 PID 2428 wrote to memory of 2248 2428 d8bec3f923f1c9exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8bec3f923f1c9exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\d8bec3f923f1c9exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD595784d0ff61138d80d396d11768a60f4
SHA1d3b064b4f446a4f36109f757dd0e05ff2d4e9586
SHA25694d6edb260bdbc25d861a0c3abdfa32c664e93867c6187300e09ca5d1a953d19
SHA512467a0afca71363b92ca685b53a3c291539104e9ee240a214585fd73e65beb5ddc2a34ddd28f0ea84272ab29b50370bf62e94605803e97b2abe30a223425fa395
-
Filesize
30KB
MD595784d0ff61138d80d396d11768a60f4
SHA1d3b064b4f446a4f36109f757dd0e05ff2d4e9586
SHA25694d6edb260bdbc25d861a0c3abdfa32c664e93867c6187300e09ca5d1a953d19
SHA512467a0afca71363b92ca685b53a3c291539104e9ee240a214585fd73e65beb5ddc2a34ddd28f0ea84272ab29b50370bf62e94605803e97b2abe30a223425fa395
-
Filesize
30KB
MD595784d0ff61138d80d396d11768a60f4
SHA1d3b064b4f446a4f36109f757dd0e05ff2d4e9586
SHA25694d6edb260bdbc25d861a0c3abdfa32c664e93867c6187300e09ca5d1a953d19
SHA512467a0afca71363b92ca685b53a3c291539104e9ee240a214585fd73e65beb5ddc2a34ddd28f0ea84272ab29b50370bf62e94605803e97b2abe30a223425fa395