Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
d206f398d6b06df7b65c5871145b5964.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d206f398d6b06df7b65c5871145b5964.exe
Resource
win10v2004-20240508-en
General
-
Target
d206f398d6b06df7b65c5871145b5964.exe
-
Size
391KB
-
MD5
d206f398d6b06df7b65c5871145b5964
-
SHA1
af643f573082ce5a3662432f915040b3a3b7121e
-
SHA256
df13f06c323aa750d9c9154921623efe532950bbf65e4b0fed042c8683171f5a
-
SHA512
28f2ed956bd7e45a61f7fec8461458a37e3a6baad807d7fbad32fd3d3bbe5cbb7b4a22921516969b22360e5ecfc7d6c746a8e6678e0c3d4ec4dc6523f76c4b83
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXRe:nnOflT/ZFIjBz3xjTxynGUOUhXRe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 d206f398d6b06df7b65c5871145b5964.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2432 2924 d206f398d6b06df7b65c5871145b5964.exe 28 PID 2924 wrote to memory of 2432 2924 d206f398d6b06df7b65c5871145b5964.exe 28 PID 2924 wrote to memory of 2432 2924 d206f398d6b06df7b65c5871145b5964.exe 28 PID 2924 wrote to memory of 2432 2924 d206f398d6b06df7b65c5871145b5964.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d206f398d6b06df7b65c5871145b5964.exe"C:\Users\Admin\AppData\Local\Temp\d206f398d6b06df7b65c5871145b5964.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5612d0bd062e5ef1945236c52de3f32cc
SHA13a5c0217ed3b0d44dffd968a9dba580ed8deb3b6
SHA256a0a71ac876d52dca4f4b11846011414cbebec3f4e6cc41ca1dd3272ce3d0cdc7
SHA512a99a7e07dd3fba06c370d2331e6ade8517f7b0c17d7352ac249e9dbec7bde1e347ccad39edfb88c2dc29a5723f33f699afd97ff2422c9aaa838c0b2fcffdbaf5