Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 09:26
Behavioral task
behavioral1
Sample
2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe
Resource
win10v2004-20230703-en
General
-
Target
2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe
-
Size
600KB
-
MD5
16268578ee81ecebe30e946d2613dbaa
-
SHA1
317d63f4b2ae410ba78421ab5f8a3b16de622b1c
-
SHA256
2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404
-
SHA512
b0aa32d66383c64fd652d5f6d9dfc921079eac242123d7a1e2d45005f6e66dcb2f6cb1b52e80f1fec670aa376c3f3dc6092f5ef594df348d2643e85ced721161
-
SSDEEP
12288:rJCVdjKQRS5yyYffTl764MRbacih2Jd8mn:EUQv5PwbWh2Zn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe -
resource yara_rule behavioral1/memory/1580-0-0x0000000000400000-0x00000000005D9000-memory.dmp upx behavioral1/files/0x0001000000000026-8.dat upx behavioral1/memory/1580-7-0x0000000000400000-0x00000000005D9000-memory.dmp upx behavioral1/memory/1580-6-0x0000000000400000-0x00000000005D9000-memory.dmp upx behavioral1/memory/2492-10-0x0000000000400000-0x00000000005D9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 2492 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2492 1580 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 28 PID 1580 wrote to memory of 2492 1580 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 28 PID 1580 wrote to memory of 2492 1580 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 28 PID 1580 wrote to memory of 2492 1580 2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe"C:\Users\Admin\AppData\Local\Temp\2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
F:\2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe"F:\2e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600KB
MD516268578ee81ecebe30e946d2613dbaa
SHA1317d63f4b2ae410ba78421ab5f8a3b16de622b1c
SHA2562e9a06ab7007db7a678e49a36a1592ac4ef7ecefe7e54adf3df771c7a24ec404
SHA512b0aa32d66383c64fd652d5f6d9dfc921079eac242123d7a1e2d45005f6e66dcb2f6cb1b52e80f1fec670aa376c3f3dc6092f5ef594df348d2643e85ced721161