Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 03:42
Behavioral task
behavioral1
Sample
a22d414045a31a20c9878baf2799f560.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a22d414045a31a20c9878baf2799f560.exe
Resource
win10v2004-20231215-en
General
-
Target
a22d414045a31a20c9878baf2799f560.exe
-
Size
77KB
-
MD5
a22d414045a31a20c9878baf2799f560
-
SHA1
0059edf1121b22da87bf39899d3e69b715d32cc4
-
SHA256
0499e1c7544298c0c1f4a8fb1130f8bb85a6c1b2e7a0c318d771116d247663ca
-
SHA512
089e958eecf899e756da0891c1919182156bb95f3baf165a6870ea72ee7b9507231df613ef5b86bba26a8c2b888f6e6be4880efd9f347a1f99e25769abf06736
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyB1:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3024 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1956 a22d414045a31a20c9878baf2799f560.exe -
resource yara_rule behavioral1/memory/1956-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000e000000012670-11.dat upx behavioral1/memory/1956-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/3024-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 3024 1956 a22d414045a31a20c9878baf2799f560.exe 28 PID 1956 wrote to memory of 3024 1956 a22d414045a31a20c9878baf2799f560.exe 28 PID 1956 wrote to memory of 3024 1956 a22d414045a31a20c9878baf2799f560.exe 28 PID 1956 wrote to memory of 3024 1956 a22d414045a31a20c9878baf2799f560.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22d414045a31a20c9878baf2799f560.exe"C:\Users\Admin\AppData\Local\Temp\a22d414045a31a20c9878baf2799f560.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD504ee836afb3267d53c36e48002503888
SHA1069a4015482b41cf31d3907d7226d0d7e84cf001
SHA25687c9ce232852f24a8ddaf231abaaa059a3f56a83127a088ac72c1733cfedbf61
SHA5123f2a020ff71d4516cfaa071956e19304f972395fd720ba8268b326adeabd902323a219e5eb577a8fdccf8f5526cd723afdc26b06f8264382bde72b68e879603b