Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
67ac9eaf8acfa7_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
67ac9eaf8acfa7_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
67ac9eaf8acfa7_JC.exe
-
Size
34KB
-
MD5
67ac9eaf8acfa790ee2487e20a33f7e6
-
SHA1
6ad5792190d491d3864e85c0d393e88acd880bb1
-
SHA256
e589520a21366866b35d43c35a072b12cb2ac0dba1c9c864385e349647d73ccb
-
SHA512
125eba1eed25390c526250231d98e482608ad23f1a4bc5aea873672ef5f3584a1a073712bcb1ba5c85ba070fdd58c6bb1f1551b3c35043a736c5485b8a0027ea
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjxgqqjMS:ZzFbxmLPWQMOtEvwDpjxMD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1444 67ac9eaf8acfa7_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1316 1444 67ac9eaf8acfa7_JC.exe 28 PID 1444 wrote to memory of 1316 1444 67ac9eaf8acfa7_JC.exe 28 PID 1444 wrote to memory of 1316 1444 67ac9eaf8acfa7_JC.exe 28 PID 1444 wrote to memory of 1316 1444 67ac9eaf8acfa7_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\67ac9eaf8acfa7_JC.exe"C:\Users\Admin\AppData\Local\Temp\67ac9eaf8acfa7_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD57a6ed0107d27e7f5f00ef67ad8f2fe77
SHA17f7c3f789311280131ad509a55276174fc4da10d
SHA256dcf5136734a6a466d8b30cb00cde14aa28c1093147267340723145cab59add19
SHA51276fbbc7be718dd818b191aa71465e0cc48089c720bdb8482e7c6b7f3a032d18ea36118b251faa112d2c9e327de03aeb2950dd193ef1a4627f196c68ff04af542
-
Filesize
34KB
MD57a6ed0107d27e7f5f00ef67ad8f2fe77
SHA17f7c3f789311280131ad509a55276174fc4da10d
SHA256dcf5136734a6a466d8b30cb00cde14aa28c1093147267340723145cab59add19
SHA51276fbbc7be718dd818b191aa71465e0cc48089c720bdb8482e7c6b7f3a032d18ea36118b251faa112d2c9e327de03aeb2950dd193ef1a4627f196c68ff04af542
-
Filesize
34KB
MD57a6ed0107d27e7f5f00ef67ad8f2fe77
SHA17f7c3f789311280131ad509a55276174fc4da10d
SHA256dcf5136734a6a466d8b30cb00cde14aa28c1093147267340723145cab59add19
SHA51276fbbc7be718dd818b191aa71465e0cc48089c720bdb8482e7c6b7f3a032d18ea36118b251faa112d2c9e327de03aeb2950dd193ef1a4627f196c68ff04af542