Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 13:23
Static task
static1
Behavioral task
behavioral1
Sample
maple.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
maple.exe
Resource
win10v2004-20230915-en
General
-
Target
maple.exe
-
Size
46.3MB
-
MD5
cff7f7fd8b55134e7833d784a9426ab6
-
SHA1
c7486db51cbf82010095414242f987fb29e7271d
-
SHA256
5d6f6b4f435027e78c4d095ddb64f171ed7b634906fe26512400b566855bbae3
-
SHA512
37dce08f83b874c2411f40432d0db12c8d5a4c5032b6c3026df3ceb8f4dc659def606a58f6b67d2f304b2da4531235a5ec706ccbefc4aa1db545834dd710698b
-
SSDEEP
786432:o33G3q9WV/qdcYoC6N6+3ECBlwharLPZvri8/R7G4NPM41Ob+:oHLCCdcNC6I+3E4lwhCLxv28Z7nNhw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1656 maple.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 maple.exe 1656 maple.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1656 2096 maple.exe 29 PID 2096 wrote to memory of 1656 2096 maple.exe 29 PID 2096 wrote to memory of 1656 2096 maple.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\maple.exe"C:\Users\Admin\AppData\Local\Temp\maple.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\onefile_2096_133415460534928000\maple.exe"C:\Users\Admin\AppData\Local\Temp\maple.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67.7MB
MD55677ce12e702baee5d361d3ad74ee657
SHA10b9444bbb00f710ab9eceb24c398190360ff8665
SHA256f7e014dc3c9a2bb153309cc76349e281b18ec38fc3965343bb66b996d20a9096
SHA51262b9fe8402111f6c9d46b3b85266c1af167113b808a436db69eaf4169f8c3b9e3b73629a1ed27c9f20908103aaecc79a83c8157788f146837bb756618b364c79
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858
-
Filesize
67.7MB
MD55677ce12e702baee5d361d3ad74ee657
SHA10b9444bbb00f710ab9eceb24c398190360ff8665
SHA256f7e014dc3c9a2bb153309cc76349e281b18ec38fc3965343bb66b996d20a9096
SHA51262b9fe8402111f6c9d46b3b85266c1af167113b808a436db69eaf4169f8c3b9e3b73629a1ed27c9f20908103aaecc79a83c8157788f146837bb756618b364c79
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858