Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 02:12

General

  • Target

    66f3d824c4fbf87c350b45668f47cf49.exe

  • Size

    38KB

  • MD5

    66f3d824c4fbf87c350b45668f47cf49

  • SHA1

    7f1fc9bd3d953c24a976f4c945b621560b93e13f

  • SHA256

    58a4ade7553834855aa9a99022ee394fddc9ce935460a5615dffc126c8ac1513

  • SHA512

    885413deb8c5aef36bc622b78a673c4491bd828347f5623c9ed00b170fdb497e9d8d7cecc6216daa5d0c2597e7bf2e6a06f73304118c95d1feb9fec4cb16677d

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpj66BLtldJQghN:i5nkFGMOtEvwDpjn/JQg7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66f3d824c4fbf87c350b45668f47cf49.exe
    "C:\Users\Admin\AppData\Local\Temp\66f3d824c4fbf87c350b45668f47cf49.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    38KB

    MD5

    ddd5a4a34b05f2044469291f0e823d10

    SHA1

    08ce07780ec108a961631d552dc4a7f3849e5aa2

    SHA256

    539089f98667fe71cfcfaa4b2a61fb187f054d25a3824f46ff7469f16581bab5

    SHA512

    ee56a20d9f4f5c2063e6efbb3c020211d9ec63d874ef47caa27dc77955be75b750b191fd18416eecf5c9411d9f3d7a90fe4919f4edebf56ea1d1f11ff7074b98

  • memory/2168-1-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2168-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2168-2-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2168-4-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2168-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2168-16-0x0000000000640000-0x000000000064F000-memory.dmp

    Filesize

    60KB

  • memory/2168-29-0x0000000000640000-0x000000000064F000-memory.dmp

    Filesize

    60KB

  • memory/2252-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2252-19-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2252-21-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2252-27-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB