Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14/07/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
21cd66c142b869exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
21cd66c142b869exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
21cd66c142b869exeexe_JC.exe
-
Size
59KB
-
MD5
21cd66c142b869711223350e325670a0
-
SHA1
62e038cba146a0fc7eb97011aa584cbe89c070a0
-
SHA256
e0505e0dfe9678b1e8aac669ff2f1b998a7556f1349b0e79b41592afe47dbcba
-
SHA512
7381314f20e96a9614608db91685d40033e1f38ae5a0f3ca4aa08ef61d2416b6ed488c3c871eba77e056c6f2999e79189c1e37f119ef618534c9ceeac24b7f02
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HyCyh7vtRJ4BqKb1cKtecE:vCjsIOtEvwDpj5Hv0L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2344 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1372 21cd66c142b869exeexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2344 1372 21cd66c142b869exeexe_JC.exe 28 PID 1372 wrote to memory of 2344 1372 21cd66c142b869exeexe_JC.exe 28 PID 1372 wrote to memory of 2344 1372 21cd66c142b869exeexe_JC.exe 28 PID 1372 wrote to memory of 2344 1372 21cd66c142b869exeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\21cd66c142b869exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\21cd66c142b869exeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD59b7961654c116c9de1f76c8c6d1ef91a
SHA1769f3a7937e1b0177b3ce2ff5d0448172f80893e
SHA256274fa5b589a40c18df6f9132efaf631419aece99d93ffc5ec77fac8b1b5f3c8c
SHA512f37fbe5b9af0285f5c78a32f9cc6563b47edda95e10fbd76a7b5f3f16a8f0954144843afd4ca3f1aa5b4b81d08ec7aa8e1e4729f5d9d23f8bcb8bcddfe0e6777
-
Filesize
59KB
MD59b7961654c116c9de1f76c8c6d1ef91a
SHA1769f3a7937e1b0177b3ce2ff5d0448172f80893e
SHA256274fa5b589a40c18df6f9132efaf631419aece99d93ffc5ec77fac8b1b5f3c8c
SHA512f37fbe5b9af0285f5c78a32f9cc6563b47edda95e10fbd76a7b5f3f16a8f0954144843afd4ca3f1aa5b4b81d08ec7aa8e1e4729f5d9d23f8bcb8bcddfe0e6777
-
Filesize
59KB
MD59b7961654c116c9de1f76c8c6d1ef91a
SHA1769f3a7937e1b0177b3ce2ff5d0448172f80893e
SHA256274fa5b589a40c18df6f9132efaf631419aece99d93ffc5ec77fac8b1b5f3c8c
SHA512f37fbe5b9af0285f5c78a32f9cc6563b47edda95e10fbd76a7b5f3f16a8f0954144843afd4ca3f1aa5b4b81d08ec7aa8e1e4729f5d9d23f8bcb8bcddfe0e6777