Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe
Resource
win10v2004-20240426-en
General
-
Target
6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe
-
Size
46KB
-
MD5
ace1ebec16f6b8d9b769fe9dd3f8fd85
-
SHA1
83c49e00f9117873571711d56363e59772e2a36c
-
SHA256
6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882
-
SHA512
886bce30e3515d8d47188ab02b7af59070558a513ec04e73cc3aebc326fd6ccfbf392d94ba78cb5fd84cd0b0b3c9851d6ffedebefdbe44de31c5b5f7c7706382
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsJD:V6QFElP6n+gMQMOtEvwDpjyaYaFAh3K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1860 6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2316 1860 6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe 28 PID 1860 wrote to memory of 2316 1860 6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe 28 PID 1860 wrote to memory of 2316 1860 6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe 28 PID 1860 wrote to memory of 2316 1860 6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe"C:\Users\Admin\AppData\Local\Temp\6391b0161d3e22407642e2e908cce3ea9ac4cda49d9c8299addc7e4097c00882.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5c10ea69babc0ced6c2a730710894ea73
SHA10625513f8086acef461d5f4a86f6988dafc69c78
SHA2563b21ec46fb00dc2e5f3303ebfa451586b4a536e085d5d8a0f0a7091272a5d750
SHA512486a5163a9f6c65bcfb98d67feed5941676fcabb15cc1ca909333597566f7a30c46f054992417a1869915ba408f0b41775153b8c1b050a9281535472dcec5751