Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2023, 11:21

General

  • Target

    68d55b02d0f88a_JC.exe

  • Size

    42KB

  • MD5

    68d55b02d0f88a03f1ea22889af1926b

  • SHA1

    8a68fdfab36bb62cd9004e865a54a085825e6365

  • SHA256

    d56ec167cc13df78ab1c8a21d269c3ea38748fda06e902914a4022a7db15957c

  • SHA512

    fc1ec03e7590d65a26e2dec72f432b290cd5de05ce5a1327d3fe6fa5bd23d10e97f281425e84076ba2c03dae78d6eaa3c5b1acdb54a29ac3833fcd38f05c7bbc

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOM+O90NWerX:qUmnpomddpMOtEvwDpjjaYaFAvCuWSX

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68d55b02d0f88a_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\68d55b02d0f88a_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    bc113a7653af7949fb3f0a2b325834f8

    SHA1

    6024173e316503cb68a54586acfa1b99ad988e13

    SHA256

    558e7891af6618f9f1e8cd77a18e2200d4b28ecb0e488a6062a7f53cd8fd43b2

    SHA512

    9eaa20e341da7271017301df309d9de856b3d81a91b9abc98a50772b7fbe11fdadc526e0ccc38833326b9844dd1cb97950d4d154beff07b8f3128423a60fd284

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    bc113a7653af7949fb3f0a2b325834f8

    SHA1

    6024173e316503cb68a54586acfa1b99ad988e13

    SHA256

    558e7891af6618f9f1e8cd77a18e2200d4b28ecb0e488a6062a7f53cd8fd43b2

    SHA512

    9eaa20e341da7271017301df309d9de856b3d81a91b9abc98a50772b7fbe11fdadc526e0ccc38833326b9844dd1cb97950d4d154beff07b8f3128423a60fd284

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    bc113a7653af7949fb3f0a2b325834f8

    SHA1

    6024173e316503cb68a54586acfa1b99ad988e13

    SHA256

    558e7891af6618f9f1e8cd77a18e2200d4b28ecb0e488a6062a7f53cd8fd43b2

    SHA512

    9eaa20e341da7271017301df309d9de856b3d81a91b9abc98a50772b7fbe11fdadc526e0ccc38833326b9844dd1cb97950d4d154beff07b8f3128423a60fd284

  • memory/1876-69-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1876-72-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1876-71-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/1876-79-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2660-53-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2660-54-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2660-56-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2660-55-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2660-68-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB