Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 01:48
Behavioral task
behavioral1
Sample
391c2618e2722cf8fa005ee3633e5dce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
391c2618e2722cf8fa005ee3633e5dce.exe
Resource
win10v2004-20231215-en
General
-
Target
391c2618e2722cf8fa005ee3633e5dce.exe
-
Size
104KB
-
MD5
391c2618e2722cf8fa005ee3633e5dce
-
SHA1
6e2d8e7b8349c2a95262cbe1ecc28ac6fa62117b
-
SHA256
47d4e016ca242c151d7858764eb37983ea86912470c39ba0ad784f9062a6bb22
-
SHA512
b40e07ce9bf8dbf4db0482cfabdee1e31ce6656c29db1a6dc79ab41c6208244c901d2237f00d42d109cee507815c7cb139f07bafcd084a80f2afa2baddd65d12
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks0g:1nK6a+qdOOtEvwDpjZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2784 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2464 391c2618e2722cf8fa005ee3633e5dce.exe -
resource yara_rule behavioral1/memory/2464-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x0009000000012249-11.dat upx behavioral1/memory/2464-14-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2784-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2784-28-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2784 2464 391c2618e2722cf8fa005ee3633e5dce.exe 28 PID 2464 wrote to memory of 2784 2464 391c2618e2722cf8fa005ee3633e5dce.exe 28 PID 2464 wrote to memory of 2784 2464 391c2618e2722cf8fa005ee3633e5dce.exe 28 PID 2464 wrote to memory of 2784 2464 391c2618e2722cf8fa005ee3633e5dce.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\391c2618e2722cf8fa005ee3633e5dce.exe"C:\Users\Admin\AppData\Local\Temp\391c2618e2722cf8fa005ee3633e5dce.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5862fdbb04888aae9c6e133004ef3acc8
SHA1185695e6026c9d7a3be64a31fe33876fb4976d3e
SHA256b74c8ae64009cfd30a22dbd4fcef822e393fd2c782946796f8f9f21bd4757c4b
SHA51284cee5aa39d448714ece06b268ed555f20b783e19da8c9aa499f82fe636270c92febef8161c1932033af39eff662cf19d948e65df64a0543540941a4310b53cd