Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
d22f098516215884c0d785866403c45a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d22f098516215884c0d785866403c45a.exe
Resource
win10v2004-20231222-en
General
-
Target
d22f098516215884c0d785866403c45a.exe
-
Size
47KB
-
MD5
d22f098516215884c0d785866403c45a
-
SHA1
0ae28d2fcf7e012b40d9470d05a03a6cf9f1a48f
-
SHA256
bb944ea475b2e15df885170bfcd27c6923df38c4e0818354f6799a5360acfc74
-
SHA512
f5941ee0be01b33b4b9d5c9db2c75fae70ab3ce418bf5095b057876ad6b6c9d8cca3d2e408f3cf1a49a1b0e1ce3e47d0cc6758f9e3c81c69a493ef0c8ac90c0f
-
SSDEEP
384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/74zpzQ:XS5nQJ24LR1bytOOtEvwDpjNbP/0Gek
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2332 d22f098516215884c0d785866403c45a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2712 2332 d22f098516215884c0d785866403c45a.exe 28 PID 2332 wrote to memory of 2712 2332 d22f098516215884c0d785866403c45a.exe 28 PID 2332 wrote to memory of 2712 2332 d22f098516215884c0d785866403c45a.exe 28 PID 2332 wrote to memory of 2712 2332 d22f098516215884c0d785866403c45a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d22f098516215884c0d785866403c45a.exe"C:\Users\Admin\AppData\Local\Temp\d22f098516215884c0d785866403c45a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5bbcec2b4c1d5c565c0ba8f444f0ecca8
SHA1dfc022a92f2b2f05647b4b83f2cdcde3125aa9cb
SHA256ab7beea79bf4a38b4e7218d98ca2708dbf01d5d10f28ef543ec8026e89f670d1
SHA512f15ce7b89553e4250744a1baf03688c86161b86d1af98b9fe8df6c07ba1b495fad571263082ec4b90acb571d9fa5f716197addc352ddde4b2190d1e57b0d5f53