Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 17:06
Static task
static1
Behavioral task
behavioral1
Sample
7b9b8feb4df6d5_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7b9b8feb4df6d5_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
7b9b8feb4df6d5_JC.exe
-
Size
74KB
-
MD5
7b9b8feb4df6d5bd529d65ce277d4258
-
SHA1
95befb2c391c12568bb01a738dc09a2b702a67a1
-
SHA256
11c83375b6ac3ba8c1f48182edb693ca383f8f7312a9a7d337425abfe87d2fd6
-
SHA512
c41a1d66b40807fa0dd57bfc363ec446ca08af6f920019ff6aa7a65621eb357e9f2439357887cb4cd033b14a691be8650556f9dd153ddf11e8a7629bd74779a9
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWant:vCjsIOtEvwDpj5H9YvQd2Lt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1064 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2476 7b9b8feb4df6d5_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1064 2476 7b9b8feb4df6d5_JC.exe 28 PID 2476 wrote to memory of 1064 2476 7b9b8feb4df6d5_JC.exe 28 PID 2476 wrote to memory of 1064 2476 7b9b8feb4df6d5_JC.exe 28 PID 2476 wrote to memory of 1064 2476 7b9b8feb4df6d5_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9b8feb4df6d5_JC.exe"C:\Users\Admin\AppData\Local\Temp\7b9b8feb4df6d5_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5bb7f1eefc0f9fc6bbe5923e5d6a35f82
SHA1f15cf0b0070e405d727f78580bf57021cf101b51
SHA256ac2d4e52178b186696a042d8233235ce84516a8c47e3694c55c1d21e31a9ae40
SHA512f8f3d78edb7f43192b6ca0ce696a2a4c56c63187531e950206d1f8daf20aabd46e540e4ca853a775e479e774a50fde0e7289f3a8373f380878ab8220a3e1a96a
-
Filesize
74KB
MD5bb7f1eefc0f9fc6bbe5923e5d6a35f82
SHA1f15cf0b0070e405d727f78580bf57021cf101b51
SHA256ac2d4e52178b186696a042d8233235ce84516a8c47e3694c55c1d21e31a9ae40
SHA512f8f3d78edb7f43192b6ca0ce696a2a4c56c63187531e950206d1f8daf20aabd46e540e4ca853a775e479e774a50fde0e7289f3a8373f380878ab8220a3e1a96a
-
Filesize
74KB
MD5bb7f1eefc0f9fc6bbe5923e5d6a35f82
SHA1f15cf0b0070e405d727f78580bf57021cf101b51
SHA256ac2d4e52178b186696a042d8233235ce84516a8c47e3694c55c1d21e31a9ae40
SHA512f8f3d78edb7f43192b6ca0ce696a2a4c56c63187531e950206d1f8daf20aabd46e540e4ca853a775e479e774a50fde0e7289f3a8373f380878ab8220a3e1a96a