Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
4a8833b299aea9587c9dc20d768623ae.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4a8833b299aea9587c9dc20d768623ae.exe
Resource
win10v2004-20240226-en
General
-
Target
4a8833b299aea9587c9dc20d768623ae.exe
-
Size
62KB
-
MD5
4a8833b299aea9587c9dc20d768623ae
-
SHA1
cd641e9441cfb445c733cbbd160178cae44faaff
-
SHA256
d46a0db52b04c9e3dc32bc3c7c4013a7312623a15693b710819cd3821de9afae
-
SHA512
4b4d41439e245c98e8e6ee382e9c5b39998b874d38209ce0b8933be3ed8a8745ac8968e1fbe98a035b525f2ac1914f13db956ec4c4b4add0c3d2162783bd754e
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMpa:TCjsIOtEvwDpj5HE/OUHnSMn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2520 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 4a8833b299aea9587c9dc20d768623ae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2520 2040 4a8833b299aea9587c9dc20d768623ae.exe 28 PID 2040 wrote to memory of 2520 2040 4a8833b299aea9587c9dc20d768623ae.exe 28 PID 2040 wrote to memory of 2520 2040 4a8833b299aea9587c9dc20d768623ae.exe 28 PID 2040 wrote to memory of 2520 2040 4a8833b299aea9587c9dc20d768623ae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a8833b299aea9587c9dc20d768623ae.exe"C:\Users\Admin\AppData\Local\Temp\4a8833b299aea9587c9dc20d768623ae.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD53fd146ac0b3779f04057f8e6e98a569b
SHA12fe2ea19c8456ec13c0ad5e3a9eead8e001281bb
SHA2563b9879a35b9c7bedad7fdcf071c63ec4a1aebcff7d723267e8444cedaa86119a
SHA512c7ed6211345f7d199825edc933e5999e15c96af28807edfcf2771d2e49e43662dd010064dc9b1d10a7ee4d4199565b646f052903941632cf7204c0af282add8b