Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14/07/2023, 16:43
Behavioral task
behavioral1
Sample
2e93d4cfbc83fcexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2e93d4cfbc83fcexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2e93d4cfbc83fcexeexe_JC.exe
-
Size
81KB
-
MD5
2e93d4cfbc83fcd4c32b28e298937b83
-
SHA1
c6a289fd349c53abf5b53a30b8f09c20bad2f1a0
-
SHA256
8f935b41186a5a5a9edcc35212bb1bbda6da0c855af1de17e53b2654c2fa829d
-
SHA512
5e4182eda2e4992e371996e63a8b6022c99437da7b12e14f3882bdad26bd5bcc9e5aa79dbe5154634cf71a6388be50fc8bd653094f44b1deb6b144a7a13b8fff
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKX55tM:T6a+rdOOtEvwDpjNt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2828 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1292 2e93d4cfbc83fcexeexe_JC.exe -
resource yara_rule behavioral1/memory/1292-53-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d00000001201e-64.dat upx behavioral1/files/0x000d00000001201e-67.dat upx behavioral1/memory/1292-69-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2828-68-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d00000001201e-78.dat upx behavioral1/memory/2828-79-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2828 1292 2e93d4cfbc83fcexeexe_JC.exe 28 PID 1292 wrote to memory of 2828 1292 2e93d4cfbc83fcexeexe_JC.exe 28 PID 1292 wrote to memory of 2828 1292 2e93d4cfbc83fcexeexe_JC.exe 28 PID 1292 wrote to memory of 2828 1292 2e93d4cfbc83fcexeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e93d4cfbc83fcexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\2e93d4cfbc83fcexeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD52305781557ca9c2bd147b170b84d2519
SHA13a737b0a3a6e8be474f5ad56c11134a0cfd6895e
SHA256b2f5063d2d303f02fa3a1eb01e90c503e5a25e5a069ba420c311babc916bcecc
SHA5126ffff5c3932bdec2359c8ec54df02882250dc0a81a8aba6dd3a3a8bdb261fd74efbd27b2bf75231deedd76d62249ed4a90eb4f50a3836e0005d6020d1e7f92f9
-
Filesize
81KB
MD52305781557ca9c2bd147b170b84d2519
SHA13a737b0a3a6e8be474f5ad56c11134a0cfd6895e
SHA256b2f5063d2d303f02fa3a1eb01e90c503e5a25e5a069ba420c311babc916bcecc
SHA5126ffff5c3932bdec2359c8ec54df02882250dc0a81a8aba6dd3a3a8bdb261fd74efbd27b2bf75231deedd76d62249ed4a90eb4f50a3836e0005d6020d1e7f92f9
-
Filesize
81KB
MD52305781557ca9c2bd147b170b84d2519
SHA13a737b0a3a6e8be474f5ad56c11134a0cfd6895e
SHA256b2f5063d2d303f02fa3a1eb01e90c503e5a25e5a069ba420c311babc916bcecc
SHA5126ffff5c3932bdec2359c8ec54df02882250dc0a81a8aba6dd3a3a8bdb261fd74efbd27b2bf75231deedd76d62249ed4a90eb4f50a3836e0005d6020d1e7f92f9