Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11-07-2023 06:36
Static task
static1
Behavioral task
behavioral1
Sample
e1ffe32a6af116exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e1ffe32a6af116exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e1ffe32a6af116exeexeexeex.exe
-
Size
75KB
-
MD5
e1ffe32a6af11670b0c6c1dd3c151595
-
SHA1
3fe51b7df2156dabfa87ed18d7d24b490078085d
-
SHA256
68dde4abe393fa85b868799a8057acd8feae9ba5864b7bfe4c6f239bd6c5ceaa
-
SHA512
2d3f3ad3839ac98bdfbcef51df09ab372fbe700634e865fd70ba17aa41e0688f40744cdf1ac703c2f550c46e521ff46705dfef9ecf83827f0c29618b1a9d93f3
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJNpsAnJYqdIR+L:ZVxkGOtEvwDpjcN5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 816 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2420 e1ffe32a6af116exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 816 2420 e1ffe32a6af116exeexeexeex.exe 29 PID 2420 wrote to memory of 816 2420 e1ffe32a6af116exeexeexeex.exe 29 PID 2420 wrote to memory of 816 2420 e1ffe32a6af116exeexeexeex.exe 29 PID 2420 wrote to memory of 816 2420 e1ffe32a6af116exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ffe32a6af116exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e1ffe32a6af116exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD568480c74e5dd58e56e6edbb338c14af6
SHA11f6715cb48430b0645a25169f6addf64eecedb7a
SHA2561e595cd52f9d214c18863dea644e0b363ae8bd51bb1662c2cc7263def69beb1e
SHA512ecbe5f6b6073e81c6a30a4ef120c166f20e12bb832ba1fd9a35a631da18ecfecec2bc1eecd36220046f7a651a532a2f713c4d69581f717e0d2dd8adaae2ed28b
-
Filesize
76KB
MD568480c74e5dd58e56e6edbb338c14af6
SHA11f6715cb48430b0645a25169f6addf64eecedb7a
SHA2561e595cd52f9d214c18863dea644e0b363ae8bd51bb1662c2cc7263def69beb1e
SHA512ecbe5f6b6073e81c6a30a4ef120c166f20e12bb832ba1fd9a35a631da18ecfecec2bc1eecd36220046f7a651a532a2f713c4d69581f717e0d2dd8adaae2ed28b
-
Filesize
76KB
MD568480c74e5dd58e56e6edbb338c14af6
SHA11f6715cb48430b0645a25169f6addf64eecedb7a
SHA2561e595cd52f9d214c18863dea644e0b363ae8bd51bb1662c2cc7263def69beb1e
SHA512ecbe5f6b6073e81c6a30a4ef120c166f20e12bb832ba1fd9a35a631da18ecfecec2bc1eecd36220046f7a651a532a2f713c4d69581f717e0d2dd8adaae2ed28b