Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe
Resource
win10v2004-20240226-en
General
-
Target
7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe
-
Size
48KB
-
MD5
c11b859beac11a69298451aaf2b729ec
-
SHA1
85991823bec682f95d7efbfc011a71dd32371f62
-
SHA256
7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979
-
SHA512
eaa3b61001f643a4b762616bca2fd7d09410e95a3f850e70b31c9ef623bcde082353f60e52bfd57705bd2e71904ebb520eb224ddf4650bc8c2ffc063410cc89b
-
SSDEEP
768:d1z6pLPxj999999996cgoYkytbdH4zdxN5HoVGWE9aT7ZLABQDqlIJ:PwP9999999996FoYkytbdH4zd7JoISH7
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral1/memory/2920-0-0x0000000000400000-0x000000000040C000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2920-2-0x0000000000400000-0x000000000040C000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000c00000001222a-4.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2972-9-0x0000000000400000-0x000000000040C000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2972 lsemc.exe -
Loads dropped DLL 1 IoCs
pid Process 2920 7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2972 2920 7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe 28 PID 2920 wrote to memory of 2972 2920 7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe 28 PID 2920 wrote to memory of 2972 2920 7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe 28 PID 2920 wrote to memory of 2972 2920 7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe"C:\Users\Admin\AppData\Local\Temp\7c222df3fe2dbd0760041c2a8f8a33975e1a3b823db6ba5e70a1842b763d8979.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\lsemc.exe"C:\Users\Admin\AppData\Local\Temp\lsemc.exe"2⤵
- Executes dropped EXE
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5785993568e1271d2629f9eea1ba8f6f7
SHA1926b5bd81091d04dbc831b2bc51c814a5d923649
SHA256f87990b1743a78256f3469ba7945a30d3123aa1f8ed74c08ac0b934d1554a5c8
SHA512e497f4af707629bc996933efce50cc93c2ae379dcc1cbc181fb5aa93b317c1db55c330492316119facc6c3fda4d9de83300d067f3a7c9332053351fd3ef8cbb8