Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 11:21
Behavioral task
behavioral1
Sample
68d55b02d0f88a_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
68d55b02d0f88a_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
68d55b02d0f88a_JC.exe
-
Size
42KB
-
MD5
68d55b02d0f88a03f1ea22889af1926b
-
SHA1
8a68fdfab36bb62cd9004e865a54a085825e6365
-
SHA256
d56ec167cc13df78ab1c8a21d269c3ea38748fda06e902914a4022a7db15957c
-
SHA512
fc1ec03e7590d65a26e2dec72f432b290cd5de05ce5a1327d3fe6fa5bd23d10e97f281425e84076ba2c03dae78d6eaa3c5b1acdb54a29ac3833fcd38f05c7bbc
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOM+O90NWerX:qUmnpomddpMOtEvwDpjjaYaFAvCuWSX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1876 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2660 68d55b02d0f88a_JC.exe -
resource yara_rule behavioral1/memory/2660-53-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x00070000000120ed-64.dat upx behavioral1/files/0x00070000000120ed-66.dat upx behavioral1/memory/1876-69-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2660-68-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x00070000000120ed-78.dat upx behavioral1/memory/1876-79-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1876 2660 68d55b02d0f88a_JC.exe 28 PID 2660 wrote to memory of 1876 2660 68d55b02d0f88a_JC.exe 28 PID 2660 wrote to memory of 1876 2660 68d55b02d0f88a_JC.exe 28 PID 2660 wrote to memory of 1876 2660 68d55b02d0f88a_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d55b02d0f88a_JC.exe"C:\Users\Admin\AppData\Local\Temp\68d55b02d0f88a_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5bc113a7653af7949fb3f0a2b325834f8
SHA16024173e316503cb68a54586acfa1b99ad988e13
SHA256558e7891af6618f9f1e8cd77a18e2200d4b28ecb0e488a6062a7f53cd8fd43b2
SHA5129eaa20e341da7271017301df309d9de856b3d81a91b9abc98a50772b7fbe11fdadc526e0ccc38833326b9844dd1cb97950d4d154beff07b8f3128423a60fd284
-
Filesize
43KB
MD5bc113a7653af7949fb3f0a2b325834f8
SHA16024173e316503cb68a54586acfa1b99ad988e13
SHA256558e7891af6618f9f1e8cd77a18e2200d4b28ecb0e488a6062a7f53cd8fd43b2
SHA5129eaa20e341da7271017301df309d9de856b3d81a91b9abc98a50772b7fbe11fdadc526e0ccc38833326b9844dd1cb97950d4d154beff07b8f3128423a60fd284
-
Filesize
43KB
MD5bc113a7653af7949fb3f0a2b325834f8
SHA16024173e316503cb68a54586acfa1b99ad988e13
SHA256558e7891af6618f9f1e8cd77a18e2200d4b28ecb0e488a6062a7f53cd8fd43b2
SHA5129eaa20e341da7271017301df309d9de856b3d81a91b9abc98a50772b7fbe11fdadc526e0ccc38833326b9844dd1cb97950d4d154beff07b8f3128423a60fd284