Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/07/2023, 13:06
Behavioral task
behavioral1
Sample
b48324883f15bb_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b48324883f15bb_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
b48324883f15bb_JC.exe
-
Size
80KB
-
MD5
b48324883f15bb9dd8fbcce32b2b580e
-
SHA1
f9d5167bedcfdb032d07381f8b76b8b87a1c7393
-
SHA256
165f127595bacc919889fca0b3b69a61a3eec84c5c871dc0fd47c52e63146141
-
SHA512
f380838d272ba7ed11a3229e5c93e81d49449519c0738b9e835e6cef2b4e24774324cea3d536fb8145dd05af9827de00440abc3b8040eaf0d8d65022c9c89595
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUcL:1nK6a+qdOOtEvwDpjL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2592 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 b48324883f15bb_JC.exe -
resource yara_rule behavioral1/memory/2640-54-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x00070000000120e6-65.dat upx behavioral1/memory/2640-69-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2592-71-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x00070000000120e6-70.dat upx behavioral1/memory/2640-67-0x0000000002020000-0x0000000002030000-memory.dmp upx behavioral1/files/0x00070000000120e6-80.dat upx behavioral1/memory/2592-81-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2592 2640 b48324883f15bb_JC.exe 28 PID 2640 wrote to memory of 2592 2640 b48324883f15bb_JC.exe 28 PID 2640 wrote to memory of 2592 2640 b48324883f15bb_JC.exe 28 PID 2640 wrote to memory of 2592 2640 b48324883f15bb_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b48324883f15bb_JC.exe"C:\Users\Admin\AppData\Local\Temp\b48324883f15bb_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD59162ed68b829d817f6f0bae5b3aa77ad
SHA17e0d83ef769645e79718d952c91ea33d6934a59c
SHA2565a1283a92be84bd2cdecd61bad3d940d9c334c99e25f9473f2096ac43fd65568
SHA5122e21d7728fd45908f52e96eace9a4b8ee6a7d402ddc57187f1ca3f325dac1d8c157570dc6d731dd2d5e61bcefe6e097f0e23a56218bb3a8ee2fb49f8f0ca4ae5
-
Filesize
80KB
MD59162ed68b829d817f6f0bae5b3aa77ad
SHA17e0d83ef769645e79718d952c91ea33d6934a59c
SHA2565a1283a92be84bd2cdecd61bad3d940d9c334c99e25f9473f2096ac43fd65568
SHA5122e21d7728fd45908f52e96eace9a4b8ee6a7d402ddc57187f1ca3f325dac1d8c157570dc6d731dd2d5e61bcefe6e097f0e23a56218bb3a8ee2fb49f8f0ca4ae5
-
Filesize
80KB
MD59162ed68b829d817f6f0bae5b3aa77ad
SHA17e0d83ef769645e79718d952c91ea33d6934a59c
SHA2565a1283a92be84bd2cdecd61bad3d940d9c334c99e25f9473f2096ac43fd65568
SHA5122e21d7728fd45908f52e96eace9a4b8ee6a7d402ddc57187f1ca3f325dac1d8c157570dc6d731dd2d5e61bcefe6e097f0e23a56218bb3a8ee2fb49f8f0ca4ae5