Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
b2369d39d59ac4e0a50f3b9cec67f358.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b2369d39d59ac4e0a50f3b9cec67f358.exe
Resource
win10v2004-20240226-en
General
-
Target
b2369d39d59ac4e0a50f3b9cec67f358.exe
-
Size
76KB
-
MD5
b2369d39d59ac4e0a50f3b9cec67f358
-
SHA1
0328cdb4ca6e34cfed5b63cfe28df94b89f5c3c0
-
SHA256
854fb7493874cefc7ce7ca7cb1b044550e9985cb8891f7cc0a3c6fe6111d3758
-
SHA512
6cadda0d915202433163a24da8e59d887e8fdcc2976ae5dc3e48ac784674c5060cd19ef12cb8b0fe95ba43f73279f5d1409df2222fdd8374c5215f0d173b7cf4
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3KujdZ:ZVxkGOtEvwDpjcaz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 632 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 b2369d39d59ac4e0a50f3b9cec67f358.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 632 2256 b2369d39d59ac4e0a50f3b9cec67f358.exe 28 PID 2256 wrote to memory of 632 2256 b2369d39d59ac4e0a50f3b9cec67f358.exe 28 PID 2256 wrote to memory of 632 2256 b2369d39d59ac4e0a50f3b9cec67f358.exe 28 PID 2256 wrote to memory of 632 2256 b2369d39d59ac4e0a50f3b9cec67f358.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2369d39d59ac4e0a50f3b9cec67f358.exe"C:\Users\Admin\AppData\Local\Temp\b2369d39d59ac4e0a50f3b9cec67f358.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD57d192236b46b5409ad5210e0c6995210
SHA10b45f0b67cf423e749d7485feb53d4e54b84a2e3
SHA2567813b44556fecc5c40a9c73b7c202912632516dd8fd5a24920b0a39c5467c395
SHA512274f1414af2b282b54666501beed73ffb54db4269d4cc4dd510377351dc3181ef842a05a241560f3239114a8216c3d300a3bebe733fc5d25587c42ba68b598cd