Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 02:30
Behavioral task
behavioral1
Sample
c7ddf3d532863db60fb07e630bcc59b5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c7ddf3d532863db60fb07e630bcc59b5.exe
Resource
win10v2004-20240226-en
General
-
Target
c7ddf3d532863db60fb07e630bcc59b5.exe
-
Size
78KB
-
MD5
c7ddf3d532863db60fb07e630bcc59b5
-
SHA1
129544e9012a52dca11ea74047b4fd2036d1352d
-
SHA256
0dbb28fd3c2d9fcfc07a49e2e2146d33584fc797aa3b0ce0c9361a2a5f5a8418
-
SHA512
f0bb705db073f7cee9183adde3839f08b5565104f68a6802a1c2a73fca412dd24f965d85d920fe6764efc50b361093d851ab72647d5e8ed2fe080da9a6d416fc
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuO:T6a+rdOOtEvwDpjNcY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2548 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 c7ddf3d532863db60fb07e630bcc59b5.exe -
resource yara_rule behavioral1/memory/1680-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c0000000122fa-11.dat upx behavioral1/memory/1680-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2548-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2548-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2548 1680 c7ddf3d532863db60fb07e630bcc59b5.exe 28 PID 1680 wrote to memory of 2548 1680 c7ddf3d532863db60fb07e630bcc59b5.exe 28 PID 1680 wrote to memory of 2548 1680 c7ddf3d532863db60fb07e630bcc59b5.exe 28 PID 1680 wrote to memory of 2548 1680 c7ddf3d532863db60fb07e630bcc59b5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7ddf3d532863db60fb07e630bcc59b5.exe"C:\Users\Admin\AppData\Local\Temp\c7ddf3d532863db60fb07e630bcc59b5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD574519205eed42d6a30d9a51248734f78
SHA1ef60c6ed6e4845e7083f1300e9956458497ccec2
SHA2564748a227b3ccc057fdd58cb770e962e8a0ce77408a10790b0d369875932ae2ec
SHA51213aedab689419fd8e67e8b97cbb58cdea40e588bde464aab3cc5367903175cb33e2c2e5571038ac7e30f00406b5a2b262aca4c170b79eff745502ea26bdadba0