Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 02:38
Behavioral task
behavioral1
Sample
2dbfd5c41c6c81210e9262266fc711d0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2dbfd5c41c6c81210e9262266fc711d0.exe
Resource
win10v2004-20240508-en
General
-
Target
2dbfd5c41c6c81210e9262266fc711d0.exe
-
Size
91KB
-
MD5
2dbfd5c41c6c81210e9262266fc711d0
-
SHA1
8b1775c0bb5328754fe2df12fb638d2919a6e1c7
-
SHA256
9503829322eb5b5dcb4a04dd5fbbad39dd9318595ab341bf33cbfdc8301576c6
-
SHA512
738788719e637e5cf7d0fd2e4096dc5da57856e43c729a48464c4810637487d5f3366af90cbde0fb99cd403078b0c0b8db6c7a92231b25686a39fbdd46f4b4e7
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAyi3:n6a+1SEOtEvwDpjYYvQd2PR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 2dbfd5c41c6c81210e9262266fc711d0.exe -
resource yara_rule behavioral1/memory/2024-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c00000001565d-11.dat upx behavioral1/memory/2024-13-0x0000000000630000-0x0000000000640000-memory.dmp upx behavioral1/memory/2024-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2692-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2692 2024 2dbfd5c41c6c81210e9262266fc711d0.exe 28 PID 2024 wrote to memory of 2692 2024 2dbfd5c41c6c81210e9262266fc711d0.exe 28 PID 2024 wrote to memory of 2692 2024 2dbfd5c41c6c81210e9262266fc711d0.exe 28 PID 2024 wrote to memory of 2692 2024 2dbfd5c41c6c81210e9262266fc711d0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dbfd5c41c6c81210e9262266fc711d0.exe"C:\Users\Admin\AppData\Local\Temp\2dbfd5c41c6c81210e9262266fc711d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5484439f0f8eea0565f4f9dd523db7e3c
SHA1cf7602cd8fcfd2334c43c53c7be3f120eb941ab6
SHA256f74c96135f6ef43ac144dbdab8f9945bae8a66d7803dda5b964b47aa74d2a707
SHA512bb36dbaec27b5eaff432a574cbb87e48ca3a582f75a9e6e0fac2561ad30e12f0b904eb84c05155bca71ddd3fc45ed6f8148ca20f29010fc2f31c4d77c08cb9bc