Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/06/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
45f46b800363c95656da31af7e51ecee.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45f46b800363c95656da31af7e51ecee.exe
Resource
win10v2004-20240508-en
General
-
Target
45f46b800363c95656da31af7e51ecee.exe
-
Size
45KB
-
MD5
45f46b800363c95656da31af7e51ecee
-
SHA1
b2048ce54b95973228a07c876fc7fca329806e4c
-
SHA256
a314668429f1faf373d826963f6683e71060e2edb6b8b97745ed0173405d52e1
-
SHA512
d677ca2e5b0468c9859038fd95542a0820aee0ad76bb5d16ff862cfa0ba787dad7a729c393cceb4da4c923d1d0c2ead945ed4f08035f4def5a8c254f8023affa
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUk3G:bm74zYcgT/EkM0ryfjd3G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 45f46b800363c95656da31af7e51ecee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2916 1932 45f46b800363c95656da31af7e51ecee.exe 28 PID 1932 wrote to memory of 2916 1932 45f46b800363c95656da31af7e51ecee.exe 28 PID 1932 wrote to memory of 2916 1932 45f46b800363c95656da31af7e51ecee.exe 28 PID 1932 wrote to memory of 2916 1932 45f46b800363c95656da31af7e51ecee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\45f46b800363c95656da31af7e51ecee.exe"C:\Users\Admin\AppData\Local\Temp\45f46b800363c95656da31af7e51ecee.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD50ba3aac63c7346f1e12537dbdf9a319c
SHA142c878d3afebcbc1d27966e06922a186a0c1028d
SHA2560700381aea8de76cc85f2bda3c011d3b9be435790d47f96c92aa47946eb7e4ef
SHA512d69ae78e252e0e653a95d803b00f86c63cfa0130383f56f0b72afe2164c850d2418aee9372538a67d261e9b5c6b1c0632ed97ded7c44b99a5bb92eb748080bf9