Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
9d96879375899916c2a01efae626d3c4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9d96879375899916c2a01efae626d3c4.exe
Resource
win10v2004-20240226-en
General
-
Target
9d96879375899916c2a01efae626d3c4.exe
-
Size
74KB
-
MD5
9d96879375899916c2a01efae626d3c4
-
SHA1
a5cf8ef063ef5007ec468610e967886fe128e5bb
-
SHA256
24dc8aa34c37599e866a56de6774cce4f68c5fe9cc339d5d86702a838e96dca3
-
SHA512
b8092a9a0f783d5b7ccd55d3f628630edd8b590d70c8d98d847b989cd7ef66c6c984c5f0dfc13be13abfc951eed4fa602c129d6846211364d36146a75d337b50
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1si:X6a+SOtEvwDpjBZYvQd2N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1804 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 9d96879375899916c2a01efae626d3c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1804 2060 9d96879375899916c2a01efae626d3c4.exe 28 PID 2060 wrote to memory of 1804 2060 9d96879375899916c2a01efae626d3c4.exe 28 PID 2060 wrote to memory of 1804 2060 9d96879375899916c2a01efae626d3c4.exe 28 PID 2060 wrote to memory of 1804 2060 9d96879375899916c2a01efae626d3c4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d96879375899916c2a01efae626d3c4.exe"C:\Users\Admin\AppData\Local\Temp\9d96879375899916c2a01efae626d3c4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD51cf7d59cbc91d02a85f19cd2f3e3eecc
SHA18ee5c2f8e813dcef4dfa78d373217c3f7bdd8123
SHA256686047bcf784fd49e98d36ca027cf19a0729c1a0d163be1658598b190c38c308
SHA512116e621077580e62ddca4918a8efb7dd4661cf5f34a84593629d2651a8c03e6e3caa1d3a5d452da173eadfd1974ae140e4a7f000842f8fe1154ba78b08e3bb8a