Analysis
-
max time kernel
156s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 03:35
Behavioral task
behavioral1
Sample
d458b3c5068f14116f1ddb91a190b402.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d458b3c5068f14116f1ddb91a190b402.exe
Resource
win10v2004-20240226-en
General
-
Target
d458b3c5068f14116f1ddb91a190b402.exe
-
Size
109KB
-
MD5
d458b3c5068f14116f1ddb91a190b402
-
SHA1
25c8cac6f7a597f5debbb982796b498f5b045e5e
-
SHA256
7e26e2b694c13053b516723684d32870a1f2a152cb5e1e7705ba808edf40d449
-
SHA512
837dd6ee706fd3ec6951e219c080565619419f9d7f87a67f72018c0a6878a8a9ad49a62299c9f7045eae9b6b6964363c3f8fc727ffc43c9da3468aee1a198888
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMgLW2:z6a+CdOOtEvwDpjczp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 d458b3c5068f14116f1ddb91a190b402.exe -
resource yara_rule behavioral1/memory/2100-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012265-11.dat upx behavioral1/memory/2100-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2720-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2720-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2720 2100 d458b3c5068f14116f1ddb91a190b402.exe 27 PID 2100 wrote to memory of 2720 2100 d458b3c5068f14116f1ddb91a190b402.exe 27 PID 2100 wrote to memory of 2720 2100 d458b3c5068f14116f1ddb91a190b402.exe 27 PID 2100 wrote to memory of 2720 2100 d458b3c5068f14116f1ddb91a190b402.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\d458b3c5068f14116f1ddb91a190b402.exe"C:\Users\Admin\AppData\Local\Temp\d458b3c5068f14116f1ddb91a190b402.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD54f3273a03aaf8a6223929e773f951749
SHA18309cfb4ec6cfeba01fec00b6962b32c6f148e85
SHA2563b6fa0e089a1dda899bed5f198a75188c77aca6b8997f6439c5f89a797076d76
SHA51237bf89bb7be14ad548583bdd89b34a0710f688e258a8c2a0f850a8ffdc974cacd4a7918d45be44cc07f771c64e8e658301a901fcfb816479a62dd28f9644c2e8