Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
b5b3629c10745e79689666366f185217.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5b3629c10745e79689666366f185217.exe
Resource
win10v2004-20240221-en
General
-
Target
b5b3629c10745e79689666366f185217.exe
-
Size
125KB
-
MD5
b5b3629c10745e79689666366f185217
-
SHA1
90ebaf57008f4d825f303df1a4e27f5c30d861f3
-
SHA256
34f19a642ac2f4149835f8ba35afd3869ee0caca299759b8cef9cad9c6a26f3b
-
SHA512
f9412d801a304cac9731e35154e151703f5b223bf754c3b8e6b998d83e594ab3d9b948d8d1ddbae87c652730b050421c9b56e86385e43dca1054e3109354e741
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBxZ:vCA9OtEvwDpjN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2944 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1720 b5b3629c10745e79689666366f185217.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2944 1720 b5b3629c10745e79689666366f185217.exe 28 PID 1720 wrote to memory of 2944 1720 b5b3629c10745e79689666366f185217.exe 28 PID 1720 wrote to memory of 2944 1720 b5b3629c10745e79689666366f185217.exe 28 PID 1720 wrote to memory of 2944 1720 b5b3629c10745e79689666366f185217.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b3629c10745e79689666366f185217.exe"C:\Users\Admin\AppData\Local\Temp\b5b3629c10745e79689666366f185217.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5485be6bd54b95416a67de4bea7e69c12
SHA1c9ca79eea2c35a4a36810b54f2c9fcbfe354baab
SHA256583617b501f74fe61b7e844d61845e6fb2677a3eee985bf7c99cdd3166a53cf8
SHA5129d6d5f8f5154af1d7d3e8be6f5912d4af647d70e10467b525384b453a503781d1746e4735c88f7c83634fd0eeb6fe56055d469aecce621c09df527b0f2195f7f