Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
4e05adae97b607exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4e05adae97b607exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4e05adae97b607exeexe_JC.exe
-
Size
56KB
-
MD5
4e05adae97b607707ddaa6d2513d1ec0
-
SHA1
ff08fb03bedc960a27bfe6ebd723470c8ca30ab3
-
SHA256
49d048e423edb900abaeb455aa6043776fcf42d976185f33dd3a6de0c14a7190
-
SHA512
b1cb01998a18c02292f8da2c7307ab7b18e3d735c979051870332b0d142ca2622a7803f5d48779db1e09a961be5957f2d15c2ee78a95693cfe3d05535fc86d4d
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kcII:6j+1NMOtEvwDpjr8ox8U9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2596 4e05adae97b607exeexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2212 2596 4e05adae97b607exeexe_JC.exe 28 PID 2596 wrote to memory of 2212 2596 4e05adae97b607exeexe_JC.exe 28 PID 2596 wrote to memory of 2212 2596 4e05adae97b607exeexe_JC.exe 28 PID 2596 wrote to memory of 2212 2596 4e05adae97b607exeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e05adae97b607exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\4e05adae97b607exeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5931ebf0ef46c338ccfbfbc3af2f0eb25
SHA1e06810bd30b139ea946e0d37614cc6765080d733
SHA256a0bc4b1bc30a4c984e52f0917495d225e03a7511a66e8bcd5b3f35d76111a567
SHA5127bb7706d16147aa797033ff9aac3d4d2f78a6ae809529b6ce77333769ae0876de3361712b9936549d918fb342b05568ff2809a2a2df72c418a4f91a0ce686581
-
Filesize
56KB
MD5931ebf0ef46c338ccfbfbc3af2f0eb25
SHA1e06810bd30b139ea946e0d37614cc6765080d733
SHA256a0bc4b1bc30a4c984e52f0917495d225e03a7511a66e8bcd5b3f35d76111a567
SHA5127bb7706d16147aa797033ff9aac3d4d2f78a6ae809529b6ce77333769ae0876de3361712b9936549d918fb342b05568ff2809a2a2df72c418a4f91a0ce686581
-
Filesize
56KB
MD5931ebf0ef46c338ccfbfbc3af2f0eb25
SHA1e06810bd30b139ea946e0d37614cc6765080d733
SHA256a0bc4b1bc30a4c984e52f0917495d225e03a7511a66e8bcd5b3f35d76111a567
SHA5127bb7706d16147aa797033ff9aac3d4d2f78a6ae809529b6ce77333769ae0876de3361712b9936549d918fb342b05568ff2809a2a2df72c418a4f91a0ce686581