Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2024, 02:47

General

  • Target

    63a855c21325fdba540c13b5710f55ff.exe

  • Size

    45KB

  • MD5

    63a855c21325fdba540c13b5710f55ff

  • SHA1

    3b15ab88bf531b5c62a9eb948342feb375433dec

  • SHA256

    eecd4103b77a579002516585a296a32af54b4e74c8903ce36f070f524d957d91

  • SHA512

    d18cbc4c1e69dd52e81c17a1d5dd4b46e9c5e429cea6f4f7637a42354b3fee7878a514792c76ebd8ccd605a6d558c805d1e98b8f3266d9b2381019118c457250

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/WZrEu/d+qmsUHQ1wsH:ZzFbxmLPWQMOtEvwDpj386Sj/WprqQ1J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63a855c21325fdba540c13b5710f55ff.exe
    "C:\Users\Admin\AppData\Local\Temp\63a855c21325fdba540c13b5710f55ff.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2812

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          45KB

          MD5

          cf8f7c589f540add7ad70039c82c8334

          SHA1

          18e9be8588d8f3d574b3cfc5974075af990a53af

          SHA256

          f62582b74b04014178e5b5abc32eeb25a6e9d25239705b01880fa36c1ae6641b

          SHA512

          6e2aad6c5ffa770369c73c018fca9e27ea986865944d35ac849c6ea72359b04954cb9fc308cc88aabfc39e8f064cb1caca54e103a6afc8c383b66a7474b2f4c8

        • memory/2812-15-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2812-17-0x0000000000350000-0x0000000000356000-memory.dmp

          Filesize

          24KB

        • memory/2812-19-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/3028-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/3028-1-0x00000000001C0000-0x00000000001C6000-memory.dmp

          Filesize

          24KB

        • memory/3028-3-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/3028-2-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB