Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 04:56
Behavioral task
behavioral1
Sample
f4bcf167d804ea705f5fa098dc7c092c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f4bcf167d804ea705f5fa098dc7c092c.exe
Resource
win10v2004-20231222-en
General
-
Target
f4bcf167d804ea705f5fa098dc7c092c.exe
-
Size
126KB
-
MD5
f4bcf167d804ea705f5fa098dc7c092c
-
SHA1
50f4304341c74e954925d9637d1e747e4256b903
-
SHA256
23415f8a5ed5e127154430fdfc450350876d64b19ec080cf678c461fd70a0dc8
-
SHA512
020a795bdcc99f38853775387994fcd2461144a34d4a3d56a54818b6e36477d896bdaa3a7631474702ba2c5e2ba6e66a2fe9ac0b57dece7cc7d66d2e340a86a3
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eTM:AnBdOOtEvwDpj6z2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1976 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 f4bcf167d804ea705f5fa098dc7c092c.exe -
resource yara_rule behavioral1/memory/2312-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000b0000000139e0-11.dat upx behavioral1/memory/2312-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/1976-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/1976-25-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1976 2312 f4bcf167d804ea705f5fa098dc7c092c.exe 28 PID 2312 wrote to memory of 1976 2312 f4bcf167d804ea705f5fa098dc7c092c.exe 28 PID 2312 wrote to memory of 1976 2312 f4bcf167d804ea705f5fa098dc7c092c.exe 28 PID 2312 wrote to memory of 1976 2312 f4bcf167d804ea705f5fa098dc7c092c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4bcf167d804ea705f5fa098dc7c092c.exe"C:\Users\Admin\AppData\Local\Temp\f4bcf167d804ea705f5fa098dc7c092c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD529882fdedbd0141bd28851f7cb2b9c8f
SHA1eaf240a600fae2a6a3fe752d24e658a267c738a7
SHA256e518389fbce8c910500f87c4d5a9ad25bf7949289af194e4bd4c7d5138c02d4a
SHA5122322039409de34865e23ce17257661d4f30d7f53be8dd077aad29fed81ab4b54b62694bcce08fb3a3b42a695834db3bff43da92c191318c71f4f690b53cd3256