Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
0f9f7e31a769bdb4e46b47b00544192b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f9f7e31a769bdb4e46b47b00544192b.exe
Resource
win10v2004-20240226-en
General
-
Target
0f9f7e31a769bdb4e46b47b00544192b.exe
-
Size
130KB
-
MD5
0f9f7e31a769bdb4e46b47b00544192b
-
SHA1
57874ba14bbd53d38b783bf797c04cdfc975c1e4
-
SHA256
1988e39bff64eb08f849e310e17ba5ad8b4900852cab1e002e7c3415e9b30f02
-
SHA512
07cff06d0817fbe57be12ba985dd7548856980a2f451cca9f408c26290fa2d0fe06562ee0a06326f3f4837fda09019be474d837fc955d143d810fb83378fafe1
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgp699GNtL1ewb:V6a+pOtEvwDpjtzs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2964 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1940 0f9f7e31a769bdb4e46b47b00544192b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2964 1940 0f9f7e31a769bdb4e46b47b00544192b.exe 28 PID 1940 wrote to memory of 2964 1940 0f9f7e31a769bdb4e46b47b00544192b.exe 28 PID 1940 wrote to memory of 2964 1940 0f9f7e31a769bdb4e46b47b00544192b.exe 28 PID 1940 wrote to memory of 2964 1940 0f9f7e31a769bdb4e46b47b00544192b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f9f7e31a769bdb4e46b47b00544192b.exe"C:\Users\Admin\AppData\Local\Temp\0f9f7e31a769bdb4e46b47b00544192b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD584457109c91bd789f4dcae82b5184f0e
SHA151c0d853c487971db99243bbfdbb43e5f57bd26a
SHA2563176759efcb55726f5fd2ae6d3c372b02444760d4924fb391cb8a60767c137cd
SHA5126164a30125652ac170222e4c49ac0599a3e6de9b7604eb4a14eaf671e0f91c20d916b362997ffe6cc2f4b4b975bf1f882aab65f3d6017435f02a02c6bb5c1457