Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 04:30
Behavioral task
behavioral1
Sample
bada5cb5dea07f81b6d8e24542734d37.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bada5cb5dea07f81b6d8e24542734d37.exe
Resource
win10v2004-20240426-en
General
-
Target
bada5cb5dea07f81b6d8e24542734d37.exe
-
Size
40KB
-
MD5
bada5cb5dea07f81b6d8e24542734d37
-
SHA1
f1fbd5df62fd11984ad0f34f08480f949b0370aa
-
SHA256
b9c6f33513522c6ec4e351cd0185e54176902722589f69e59a1e614c256a1a8c
-
SHA512
65b86d262dcd570fdcd52f4e87e82bbeb627f53aad36b1c2e67d40c8a17a43d471c343a7b9d17048523a1b789827c4436ee8c393db6a54fc2bfacc761849ef04
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYabDb2q:qDdFJy3QMOtEvwDpjjWMl7TdP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 bada5cb5dea07f81b6d8e24542734d37.exe -
resource yara_rule behavioral1/memory/2256-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000015c5d-11.dat upx behavioral1/memory/2800-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2256-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2800-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2800 2256 bada5cb5dea07f81b6d8e24542734d37.exe 28 PID 2256 wrote to memory of 2800 2256 bada5cb5dea07f81b6d8e24542734d37.exe 28 PID 2256 wrote to memory of 2800 2256 bada5cb5dea07f81b6d8e24542734d37.exe 28 PID 2256 wrote to memory of 2800 2256 bada5cb5dea07f81b6d8e24542734d37.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bada5cb5dea07f81b6d8e24542734d37.exe"C:\Users\Admin\AppData\Local\Temp\bada5cb5dea07f81b6d8e24542734d37.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD53fa45b5fb662c97cdfec6522b1bc397f
SHA1655ca33d98873d91e0d76b9749e8bc30365bb292
SHA25677b3c9d4e9eaf820b1e5004b3542eae5cfc090ec688c2bb7e1c9511530169cc9
SHA512638b70959f98a9bd2ad5ac853bd7f30843a24d34ed892098d0b6e180a4a4ece0cf10712dc0ffd5f5516bc7f8c7888801723d4ea5fc55ac02a51dc8b29c7a8757