Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14-07-2023 12:37
Behavioral task
behavioral1
Sample
18b08276269688exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
18b08276269688exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
18b08276269688exe_JC.exe
-
Size
98KB
-
MD5
18b082762696887b3679557baebacfa1
-
SHA1
63736733e848dadaeccb001704d76c4c93f78dc5
-
SHA256
11f9f7e01c6b71d97c700847cdaeee0b6150715908e6055c6cb9b60a86dbd4a1
-
SHA512
be41ea41eaefcbb8bcf01a754d42690416f227fd07529185214b4ea7a08cc0465ee37d996d371e84ca524db012e93e04743acf9ccc0584cc2dc2019a7febc41e
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhn:AnBdOOtEvwDpj6za
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2224 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2572 18b08276269688exe_JC.exe -
resource yara_rule behavioral1/memory/2572-54-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0007000000012107-65.dat upx behavioral1/files/0x0007000000012107-68.dat upx behavioral1/memory/2224-70-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2572-69-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0007000000012107-79.dat upx behavioral1/memory/2224-80-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2224 2572 18b08276269688exe_JC.exe 28 PID 2572 wrote to memory of 2224 2572 18b08276269688exe_JC.exe 28 PID 2572 wrote to memory of 2224 2572 18b08276269688exe_JC.exe 28 PID 2572 wrote to memory of 2224 2572 18b08276269688exe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\18b08276269688exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\18b08276269688exe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5c8b4393a0967aa0c8bb89434a82f2719
SHA106445bba34159369ef701896841ba5d2e7315682
SHA256bb2147e43371474647cc931e1347324a3f97188fa776bc684edc96e8f1ff7d7f
SHA5129671f54d8f49918f35de3bd8700a88d4678bc42e0d4af5ed4d6a2b0bc5fdcf4238d06c8331391167615a3f7b9338a9c46b7bb48d6b8d8b95e5a360758313cf6c
-
Filesize
98KB
MD5c8b4393a0967aa0c8bb89434a82f2719
SHA106445bba34159369ef701896841ba5d2e7315682
SHA256bb2147e43371474647cc931e1347324a3f97188fa776bc684edc96e8f1ff7d7f
SHA5129671f54d8f49918f35de3bd8700a88d4678bc42e0d4af5ed4d6a2b0bc5fdcf4238d06c8331391167615a3f7b9338a9c46b7bb48d6b8d8b95e5a360758313cf6c
-
Filesize
98KB
MD5c8b4393a0967aa0c8bb89434a82f2719
SHA106445bba34159369ef701896841ba5d2e7315682
SHA256bb2147e43371474647cc931e1347324a3f97188fa776bc684edc96e8f1ff7d7f
SHA5129671f54d8f49918f35de3bd8700a88d4678bc42e0d4af5ed4d6a2b0bc5fdcf4238d06c8331391167615a3f7b9338a9c46b7bb48d6b8d8b95e5a360758313cf6c