Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 13:28
Behavioral task
behavioral1
Sample
74326b35e80fff_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
74326b35e80fff_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
74326b35e80fff_JC.exe
-
Size
43KB
-
MD5
74326b35e80fff36ea09945915d5fbbd
-
SHA1
d048a43fb5c70bf50da46f578bd7d54c5b92aec3
-
SHA256
9f95f6d140eb42078e4508cec1d8be8b7200876b3f39b994a326131354e9e564
-
SHA512
e244b89454b212381aa028d73efae5879181e980e8f6820acdc845efc3f8ff1d690b24915d2ac12f8ad72efce4ab86795ff7244deef84d1514ba3625e26f3b30
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzfm5oU3tupd1:qUmnpomddpMOtEvwDpjjaYaFAh5md1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2372 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 74326b35e80fff_JC.exe -
resource yara_rule behavioral1/memory/3000-54-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012023-65.dat upx behavioral1/memory/3000-68-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012023-69.dat upx behavioral1/memory/2372-71-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012023-80.dat upx behavioral1/memory/2372-82-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2372 3000 74326b35e80fff_JC.exe 28 PID 3000 wrote to memory of 2372 3000 74326b35e80fff_JC.exe 28 PID 3000 wrote to memory of 2372 3000 74326b35e80fff_JC.exe 28 PID 3000 wrote to memory of 2372 3000 74326b35e80fff_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\74326b35e80fff_JC.exe"C:\Users\Admin\AppData\Local\Temp\74326b35e80fff_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD54011338478ee32560921c083dd78608f
SHA1a71af213edcefcfea53dab6121859ed6573f9bd3
SHA256bc96cd83bc3edc633bc08d78ebfa19bbf288c92885a9918f014c53c3b20d7c64
SHA5120139756640b18bb20c2bd57038b463606a9bf67ab662536f581545b8d3b590a635d749836738c7053856c783beaf34ca400508505e1218b63ee330bca9b3070d
-
Filesize
43KB
MD54011338478ee32560921c083dd78608f
SHA1a71af213edcefcfea53dab6121859ed6573f9bd3
SHA256bc96cd83bc3edc633bc08d78ebfa19bbf288c92885a9918f014c53c3b20d7c64
SHA5120139756640b18bb20c2bd57038b463606a9bf67ab662536f581545b8d3b590a635d749836738c7053856c783beaf34ca400508505e1218b63ee330bca9b3070d
-
Filesize
43KB
MD54011338478ee32560921c083dd78608f
SHA1a71af213edcefcfea53dab6121859ed6573f9bd3
SHA256bc96cd83bc3edc633bc08d78ebfa19bbf288c92885a9918f014c53c3b20d7c64
SHA5120139756640b18bb20c2bd57038b463606a9bf67ab662536f581545b8d3b590a635d749836738c7053856c783beaf34ca400508505e1218b63ee330bca9b3070d