Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
5e8b7593044fa9e7e851770871ee4772.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e8b7593044fa9e7e851770871ee4772.exe
Resource
win10v2004-20240226-en
General
-
Target
5e8b7593044fa9e7e851770871ee4772.exe
-
Size
56KB
-
MD5
5e8b7593044fa9e7e851770871ee4772
-
SHA1
c8ddac45c1b5949d0dce38c550bd618b9359c882
-
SHA256
3e3af2e436b911978db53c0fb269baf363859c160f653d75f60c3a92ef4f6198
-
SHA512
4f7344911310e999cd76f8e04de9a2bb4788f8a3896ffa8fe2f03fd88d927c8b0c78c1c33892399d617c54f50c59b0172bd835b3068f1042849bde5b43c69928
-
SSDEEP
1536:X6QFElP6n+gJBMOtEvwDpjBtE1yILJ0V5R:X6a+BOtEvwDpjBOM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2884 5e8b7593044fa9e7e851770871ee4772.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3012 2884 5e8b7593044fa9e7e851770871ee4772.exe 28 PID 2884 wrote to memory of 3012 2884 5e8b7593044fa9e7e851770871ee4772.exe 28 PID 2884 wrote to memory of 3012 2884 5e8b7593044fa9e7e851770871ee4772.exe 28 PID 2884 wrote to memory of 3012 2884 5e8b7593044fa9e7e851770871ee4772.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e8b7593044fa9e7e851770871ee4772.exe"C:\Users\Admin\AppData\Local\Temp\5e8b7593044fa9e7e851770871ee4772.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5a789fd6b0a34f22ba82bef1b615dd56b
SHA1f0957dfc028f2953b5f2c6d6a4fa74be605047ec
SHA2565dcbe53be1fc35c0ec10db0668a2487dbb2e1ef9cb157879175cfe33de664b64
SHA512e4fae810e4614514afc6c93ffa0839a0282e4bc3254610257ad554c99c0e33570979875b943c489ce2c9fb546a6bf3f2dd0179df92699bcb3ebb4226b140617d