Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/07/2023, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
bca14565e8d562_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bca14565e8d562_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
bca14565e8d562_JC.exe
-
Size
37KB
-
MD5
bca14565e8d5626eb177ad9a1ee868e6
-
SHA1
2a00a1fcb5a18670c33e77391cef0c0898f82bf6
-
SHA256
d13851bd95c0586dd1eec7fabb80e134927fbbf976b7983170ec6c4946741f1b
-
SHA512
c2d959b09c931ce4c02da30491993ab56013b432b25633b818377266b8791be25290c6cbbce3d941829f508c676b8fbb46c6961b3d161f5865bf7ec7f4bb3934
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72kmGYjTmw:bgX4zYcgTEu6QOaryfjqDlC7rY+w
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2936 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2468 bca14565e8d562_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2936 2468 bca14565e8d562_JC.exe 28 PID 2468 wrote to memory of 2936 2468 bca14565e8d562_JC.exe 28 PID 2468 wrote to memory of 2936 2468 bca14565e8d562_JC.exe 28 PID 2468 wrote to memory of 2936 2468 bca14565e8d562_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bca14565e8d562_JC.exe"C:\Users\Admin\AppData\Local\Temp\bca14565e8d562_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD50bffe4a60c09aa4c344d9c7ec8c830ec
SHA17d6900d57d0eec14c52365122b4f78fad908d598
SHA256fc9a325bf749a378a34fa5e649aa76bcc3d0cee75738ab90ce71e343411257d5
SHA5120fb66384d1899dc978db1a0b87b5afba78a50de2898e9aa74cfa2f35d34ada7578b5a41294c34d9bef1774a341f8d78ddfb4b0ba6e65762596c7466c599a7af9
-
Filesize
37KB
MD50bffe4a60c09aa4c344d9c7ec8c830ec
SHA17d6900d57d0eec14c52365122b4f78fad908d598
SHA256fc9a325bf749a378a34fa5e649aa76bcc3d0cee75738ab90ce71e343411257d5
SHA5120fb66384d1899dc978db1a0b87b5afba78a50de2898e9aa74cfa2f35d34ada7578b5a41294c34d9bef1774a341f8d78ddfb4b0ba6e65762596c7466c599a7af9
-
Filesize
37KB
MD50bffe4a60c09aa4c344d9c7ec8c830ec
SHA17d6900d57d0eec14c52365122b4f78fad908d598
SHA256fc9a325bf749a378a34fa5e649aa76bcc3d0cee75738ab90ce71e343411257d5
SHA5120fb66384d1899dc978db1a0b87b5afba78a50de2898e9aa74cfa2f35d34ada7578b5a41294c34d9bef1774a341f8d78ddfb4b0ba6e65762596c7466c599a7af9