Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 18:04
Behavioral task
behavioral1
Sample
fecc74eabcf94eexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fecc74eabcf94eexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
fecc74eabcf94eexe_JC.exe
-
Size
90KB
-
MD5
fecc74eabcf94e4141a0c65f7aeadf76
-
SHA1
349a5a881707f207a09bd796ad21420639d39529
-
SHA256
b4f8327a0aa29fdd42b4ec3588ce73dd2b919121f89c17b7b7e7df2c31f9b418
-
SHA512
d71d67d5619ba787f247dec6c607f19912a5d2bb9401248a7661aaa1e808d035f5bb0811b7ef6e34c0e6140eada339c398b82daf2ecaed537b8fe16c15c4bed2
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDWTHE:zCsanOtEvwDpjE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 fecc74eabcf94eexe_JC.exe -
resource yara_rule behavioral1/memory/2224-53-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0007000000012107-64.dat upx behavioral1/files/0x0007000000012107-67.dat upx behavioral1/memory/2224-68-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2272-69-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0007000000012107-77.dat upx behavioral1/memory/2272-78-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2272 2224 fecc74eabcf94eexe_JC.exe 28 PID 2224 wrote to memory of 2272 2224 fecc74eabcf94eexe_JC.exe 28 PID 2224 wrote to memory of 2272 2224 fecc74eabcf94eexe_JC.exe 28 PID 2224 wrote to memory of 2272 2224 fecc74eabcf94eexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fecc74eabcf94eexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fecc74eabcf94eexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD51ff6e84478b84cdcaab01e870f98648c
SHA1c3c0553341b36b2fe42e2e6230bf3f78159d1fb0
SHA256ca500a15ae3e70e2ad6e73f52ef2c506b4db2f4cb3477fdbf0636eb985d47b90
SHA5122301de2e540c465a7b2d023f2f0d622bfe9ba8c04596e80b3cd4e6628fbb51e476743f36054b108554c6be659162808d5bf9a95b404bb4d9b9bef2852be941be
-
Filesize
90KB
MD51ff6e84478b84cdcaab01e870f98648c
SHA1c3c0553341b36b2fe42e2e6230bf3f78159d1fb0
SHA256ca500a15ae3e70e2ad6e73f52ef2c506b4db2f4cb3477fdbf0636eb985d47b90
SHA5122301de2e540c465a7b2d023f2f0d622bfe9ba8c04596e80b3cd4e6628fbb51e476743f36054b108554c6be659162808d5bf9a95b404bb4d9b9bef2852be941be
-
Filesize
90KB
MD51ff6e84478b84cdcaab01e870f98648c
SHA1c3c0553341b36b2fe42e2e6230bf3f78159d1fb0
SHA256ca500a15ae3e70e2ad6e73f52ef2c506b4db2f4cb3477fdbf0636eb985d47b90
SHA5122301de2e540c465a7b2d023f2f0d622bfe9ba8c04596e80b3cd4e6628fbb51e476743f36054b108554c6be659162808d5bf9a95b404bb4d9b9bef2852be941be