Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
cd2f2f0a59f5ee39bb1dd52f854f97bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd2f2f0a59f5ee39bb1dd52f854f97bd.exe
Resource
win10v2004-20240221-en
General
-
Target
cd2f2f0a59f5ee39bb1dd52f854f97bd.exe
-
Size
31KB
-
MD5
cd2f2f0a59f5ee39bb1dd52f854f97bd
-
SHA1
948b04c91660ee2475599dd1d3fd27a5896df4a2
-
SHA256
822a0c35e3177e8e5aebae815d462876f890a03c6e48d03bd5bfabe437ccac27
-
SHA512
0ba7436ceacf44e37824aa67f26070e37395568e1ea3973df484e2553e849cb2c87abda5eb76d960cd05fa0159a42ef4315bcc3be135212696214438c4520c5a
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunvsjU:bA74zYcgT/Ekd0ryfjPIunvsjU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2532 3044 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe 28 PID 3044 wrote to memory of 2532 3044 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe 28 PID 3044 wrote to memory of 2532 3044 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe 28 PID 3044 wrote to memory of 2532 3044 cd2f2f0a59f5ee39bb1dd52f854f97bd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd2f2f0a59f5ee39bb1dd52f854f97bd.exe"C:\Users\Admin\AppData\Local\Temp\cd2f2f0a59f5ee39bb1dd52f854f97bd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5e43f0686fec8ec2dc2dcd602c8332fa3
SHA196f17d917d51d7bd98c4f5f55617df8e88a56cf3
SHA256a0addb0dd1a06ca87c4714ded77f8f0c5dfec8065d4a6e01a70a137ada78cb9b
SHA5120e834c9bf119d985191974c7b489dcb018f17453c6a37af92ceef7dbcee2df86e62aa1e1d92f51bfef65a716a1b39d27a17b862dbedfff4ff1f1967b9bce8c29