Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:12
Behavioral task
behavioral1
Sample
24147881c3d393d0a8c7c8c62668e88c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
24147881c3d393d0a8c7c8c62668e88c.exe
Resource
win10v2004-20231215-en
General
-
Target
24147881c3d393d0a8c7c8c62668e88c.exe
-
Size
14KB
-
MD5
24147881c3d393d0a8c7c8c62668e88c
-
SHA1
bc724981cab03f87518b566afb786a596361f276
-
SHA256
d72155b95d4a53a3399044273b68ac273b708ab360b8bbeb2a44a9bcc6a3bd05
-
SHA512
9ab5c435f275b1ae2f6fcc6d68ab8eefe1f8cb0456c75a05f9d30b1a2a81f1fd20e92fb7ea5c97f883961ed41d6781f5ae45a29a4575760f5dd301c50eadc021
-
SSDEEP
384:UcQIjE5EpcvLfhc5waHf3zNZGtIUE7q1mozuOsf3:UsrpcDiqavR0Cq1ZVsP
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1096 micsusk.exe -
resource yara_rule behavioral2/memory/1508-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x000600000002322c-4.dat upx behavioral2/memory/1508-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/1096-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\micsus.dll 24147881c3d393d0a8c7c8c62668e88c.exe File created C:\Windows\SysWOW64\micsusk.exe 24147881c3d393d0a8c7c8c62668e88c.exe File opened for modification C:\Windows\SysWOW64\micsusk.exe 24147881c3d393d0a8c7c8c62668e88c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1096 1508 24147881c3d393d0a8c7c8c62668e88c.exe 89 PID 1508 wrote to memory of 1096 1508 24147881c3d393d0a8c7c8c62668e88c.exe 89 PID 1508 wrote to memory of 1096 1508 24147881c3d393d0a8c7c8c62668e88c.exe 89 PID 1508 wrote to memory of 1140 1508 24147881c3d393d0a8c7c8c62668e88c.exe 104 PID 1508 wrote to memory of 1140 1508 24147881c3d393d0a8c7c8c62668e88c.exe 104 PID 1508 wrote to memory of 1140 1508 24147881c3d393d0a8c7c8c62668e88c.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\24147881c3d393d0a8c7c8c62668e88c.exe"C:\Users\Admin\AppData\Local\Temp\24147881c3d393d0a8c7c8c62668e88c.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\micsusk.exeC:\Windows\system32\micsusk.exe ˜‰2⤵
- Executes dropped EXE
PID:1096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\24147881c3d393d0a8c7c8c62668e88c.exe.bat2⤵PID:1140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD52944d852d1d51ac99fd5d00a4bc49c70
SHA19ad8d5c2fd88e8ca1a0f74dc3db927d409e9b06d
SHA2564f58f16d891324a4070562882932987b7bd3ff9a7ddf7494e930f1cbfb72ea5e
SHA512e9ca295abe7e85a371e61d374fd2fc2ec9a1d7e042ecc4406f97a42372d4463aff73a50deb7506db2310ee44cab25a7aa404b1ebd27922c5d3d6ca1aabbf7b60
-
Filesize
14KB
MD524147881c3d393d0a8c7c8c62668e88c
SHA1bc724981cab03f87518b566afb786a596361f276
SHA256d72155b95d4a53a3399044273b68ac273b708ab360b8bbeb2a44a9bcc6a3bd05
SHA5129ab5c435f275b1ae2f6fcc6d68ab8eefe1f8cb0456c75a05f9d30b1a2a81f1fd20e92fb7ea5c97f883961ed41d6781f5ae45a29a4575760f5dd301c50eadc021