Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
e23a710ef2f968exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e23a710ef2f968exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e23a710ef2f968exeexeexeex.exe
-
Size
32KB
-
MD5
e23a710ef2f968c1bf6df9c5a8f44a5e
-
SHA1
c720e63185271ed04c1cf61e792062f51478fc51
-
SHA256
2e1a700d403bf0361db6eb3b3721109d4508cf4ba8849d0cd3642296e05a2d32
-
SHA512
e53dd486510b5fe0a41f1d862392c1a3f2deab334f674c84ff93696f168206dcdc4c226ab6081629ecc2aef625f476ee3f6d3349cecefa53dba07065b61b4c77
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeW00shUQ:q0zizzOSxMOtEvwDpj/0dh7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2200 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 e23a710ef2f968exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2200 2664 e23a710ef2f968exeexeexeex.exe 29 PID 2664 wrote to memory of 2200 2664 e23a710ef2f968exeexeexeex.exe 29 PID 2664 wrote to memory of 2200 2664 e23a710ef2f968exeexeexeex.exe 29 PID 2664 wrote to memory of 2200 2664 e23a710ef2f968exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e23a710ef2f968exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e23a710ef2f968exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5102c3616b3b25cde3225c854b3edbcdc
SHA162263127f836df2586d8cc755fdf7952c8748976
SHA256f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3
SHA512bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219
-
Filesize
32KB
MD5102c3616b3b25cde3225c854b3edbcdc
SHA162263127f836df2586d8cc755fdf7952c8748976
SHA256f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3
SHA512bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219
-
Filesize
32KB
MD5102c3616b3b25cde3225c854b3edbcdc
SHA162263127f836df2586d8cc755fdf7952c8748976
SHA256f4749a8673c25345ad2aaf6bc3dda55a175226f59b36f9e364d3a1075d68d2c3
SHA512bcd27baafddea466b49e57735959a753fa18ef4fc458ade4997706f5b59f7912a60b1a19079945989eaa8799397c2f9e5a55b71e08c88bb6cbdf33cfdd31e219