Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/07/2023, 15:58
Behavioral task
behavioral1
Sample
NA_NA_12662c454eb8efexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_12662c454eb8efexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_12662c454eb8efexeexe_JC.exe
-
Size
101KB
-
MD5
12662c454eb8efba8cf4629e027f614b
-
SHA1
15993d93a9ef13c4c10d849ec5741c52a3c6f370
-
SHA256
bf76cb616b6e4bbfa6906d062996034333c7af3b8ccdace8be88b9acca0f8c17
-
SHA512
9fc7131f9c9b9f896671f894a04bafe8ac506ad8dfafa9e9f8d6b5167cb66a8fc8faefdf40ec4e9a3d8f485014a0cd8050fd7836b6a50b4c6781b6e7d3b42460
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn58+V:1nK6a+qdOOtEvwDpjW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2124 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 NA_NA_12662c454eb8efexeexe_JC.exe -
resource yara_rule behavioral1/memory/2040-54-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2040-68-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a000000012029-69.dat upx behavioral1/memory/2124-70-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a000000012029-65.dat upx behavioral1/files/0x000a000000012029-79.dat upx behavioral1/memory/2124-80-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2124 2040 NA_NA_12662c454eb8efexeexe_JC.exe 28 PID 2040 wrote to memory of 2124 2040 NA_NA_12662c454eb8efexeexe_JC.exe 28 PID 2040 wrote to memory of 2124 2040 NA_NA_12662c454eb8efexeexe_JC.exe 28 PID 2040 wrote to memory of 2124 2040 NA_NA_12662c454eb8efexeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_12662c454eb8efexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_12662c454eb8efexeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD59e67bb04ec5435ff7ec901bd935efbed
SHA14d95e850bf62edf954db5a0b257835de41103e46
SHA25688de0248765af6e71530b9c71f2b5f5e61eac928642fa7ddab866eb77596eb5c
SHA51234c21173552c62d8530601dbb1f3518481de8a8ce360bd0adae3e075005b6e533b1e9d04789cea2fe6f0fceb78c9f7ab6d3e95fbf89dd6c97da2c801415f39fd
-
Filesize
101KB
MD59e67bb04ec5435ff7ec901bd935efbed
SHA14d95e850bf62edf954db5a0b257835de41103e46
SHA25688de0248765af6e71530b9c71f2b5f5e61eac928642fa7ddab866eb77596eb5c
SHA51234c21173552c62d8530601dbb1f3518481de8a8ce360bd0adae3e075005b6e533b1e9d04789cea2fe6f0fceb78c9f7ab6d3e95fbf89dd6c97da2c801415f39fd
-
Filesize
101KB
MD59e67bb04ec5435ff7ec901bd935efbed
SHA14d95e850bf62edf954db5a0b257835de41103e46
SHA25688de0248765af6e71530b9c71f2b5f5e61eac928642fa7ddab866eb77596eb5c
SHA51234c21173552c62d8530601dbb1f3518481de8a8ce360bd0adae3e075005b6e533b1e9d04789cea2fe6f0fceb78c9f7ab6d3e95fbf89dd6c97da2c801415f39fd