Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
95a0d45a782cead55491ebfc69e6e976.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95a0d45a782cead55491ebfc69e6e976.exe
Resource
win10v2004-20240221-en
General
-
Target
95a0d45a782cead55491ebfc69e6e976.exe
-
Size
51KB
-
MD5
95a0d45a782cead55491ebfc69e6e976
-
SHA1
be2c744174bf720d9c8fe6a4914c2524b1206b35
-
SHA256
4ca4414140c38760fd6d4b09f75b7eab690bf0dfaa012c9d965ed6400dbe4fcc
-
SHA512
2151e01ef9bd506c2207ac63c14de7a05581ccf7303595140487324dff44d43adca1e9045416e259a0158bf56ee27ef98d28a22d6e1d4d68d3f51b0bd6e2d71a
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MzF3Fn:i5nkFGMOtEvwDpjNbwQEqN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 932 95a0d45a782cead55491ebfc69e6e976.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 932 wrote to memory of 2568 932 95a0d45a782cead55491ebfc69e6e976.exe 28 PID 932 wrote to memory of 2568 932 95a0d45a782cead55491ebfc69e6e976.exe 28 PID 932 wrote to memory of 2568 932 95a0d45a782cead55491ebfc69e6e976.exe 28 PID 932 wrote to memory of 2568 932 95a0d45a782cead55491ebfc69e6e976.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a0d45a782cead55491ebfc69e6e976.exe"C:\Users\Admin\AppData\Local\Temp\95a0d45a782cead55491ebfc69e6e976.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD596c9bce015f8b8473b9d0e4bdc7949af
SHA10e982213a4e743062ced4afc9f09c2900fde0ed9
SHA256a8b5326d27416f5012503012f9f4c71ee222f2597e48218c7f846024d7db907e
SHA512bf3737f1a0e063dd3e8441481e209e88b524ded6c1ad46e8f19a70d50c8d16fa089bf0e11b8c0ed09dd69ac46fe2dd313d016da3df3d7ea016c4f248264a7d32