Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 16:44
Static task
static1
Behavioral task
behavioral1
Sample
77df53b75a9b6b_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
77df53b75a9b6b_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
77df53b75a9b6b_JC.exe
-
Size
43KB
-
MD5
77df53b75a9b6b203f5d79db771cbadb
-
SHA1
6ff5d405eebc07a26cc545bd0e16f63939fb2a33
-
SHA256
530b1610c4181f28238d40550454acf53c656b29022cc4b9bbd5c0c514d26b6f
-
SHA512
5c287e1bb1d3933f9440bf83bb61fa28e770c2ac94b21adeddd3abe548af55c4da945854d2c68c65423d660add62115b57ca0babb7f778fee70baab7b898e1fe
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8iB23i:vj+jsMQMOtEvwDpj5HczV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2456 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2676 77df53b75a9b6b_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2456 2676 77df53b75a9b6b_JC.exe 28 PID 2676 wrote to memory of 2456 2676 77df53b75a9b6b_JC.exe 28 PID 2676 wrote to memory of 2456 2676 77df53b75a9b6b_JC.exe 28 PID 2676 wrote to memory of 2456 2676 77df53b75a9b6b_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77df53b75a9b6b_JC.exe"C:\Users\Admin\AppData\Local\Temp\77df53b75a9b6b_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2456
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5e1800e8ba5c0aa67f8cf0af7e811efc0
SHA1ab7fa15d84e76a58d053eeccc00a29e276d7ebd4
SHA256f8f295c051aec6f267669ab9016a05a5dd12ed8dd160110413643b23c5cf4b61
SHA512928ea15d6ca7e3a43643e65363679c0caa5d246724f5434f32b4f06ef2a54679ce1dfd4ff354d1bed7f53fdc287d34dc8c600ededaf88ffb89a7c90da726bcb7
-
Filesize
43KB
MD5e1800e8ba5c0aa67f8cf0af7e811efc0
SHA1ab7fa15d84e76a58d053eeccc00a29e276d7ebd4
SHA256f8f295c051aec6f267669ab9016a05a5dd12ed8dd160110413643b23c5cf4b61
SHA512928ea15d6ca7e3a43643e65363679c0caa5d246724f5434f32b4f06ef2a54679ce1dfd4ff354d1bed7f53fdc287d34dc8c600ededaf88ffb89a7c90da726bcb7
-
Filesize
43KB
MD5e1800e8ba5c0aa67f8cf0af7e811efc0
SHA1ab7fa15d84e76a58d053eeccc00a29e276d7ebd4
SHA256f8f295c051aec6f267669ab9016a05a5dd12ed8dd160110413643b23c5cf4b61
SHA512928ea15d6ca7e3a43643e65363679c0caa5d246724f5434f32b4f06ef2a54679ce1dfd4ff354d1bed7f53fdc287d34dc8c600ededaf88ffb89a7c90da726bcb7