Analysis

  • max time kernel
    173s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 04:13

General

  • Target

    c5c610d5b50f0fb37b008a00a3da27c0.exe

  • Size

    66KB

  • MD5

    c5c610d5b50f0fb37b008a00a3da27c0

  • SHA1

    a4eb226dea01c50f6d82b8844996340ed995c5f3

  • SHA256

    a2c530274f924ea7cdb18a0a95ee19a84606c78ea48b6f8663655f7c70db9533

  • SHA512

    0d5310984dd795130dc881a6596c8eda57cf93850756c2cd80877f627ba4315a9def72fdedbc7fc9c565a0ee0e49f01c8ad7ebf57272a269cac5d3b8305dac82

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpE0P/xFY:6j+1NMOtEvwDpjr8ox8UDEpN/jY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5c610d5b50f0fb37b008a00a3da27c0.exe
    "C:\Users\Admin\AppData\Local\Temp\c5c610d5b50f0fb37b008a00a3da27c0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2524

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          66KB

          MD5

          7f82c9c7ce3d2803f0cbe3da1ddec00a

          SHA1

          2ea3df12fb0af61b52067fe98da2655ecdb149d0

          SHA256

          aad8c72d6e6c9957ee58a584aff22b9d5cd7fd72c2748b047b0a3d7556e2f19b

          SHA512

          bf20291a77282988af06a7445e28c07bf34b942edf9e4cdb1f53150acca0e3a165fb899e7bc6f0202072ef7fe4d831c15c12a393a6c9274647ff13419ba5e6b0

        • memory/2524-17-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2524-19-0x00000000004C0000-0x00000000004C6000-memory.dmp

          Filesize

          24KB

        • memory/2524-20-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/2524-27-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2536-1-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2536-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/2536-3-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/2536-2-0x0000000000600000-0x0000000000606000-memory.dmp

          Filesize

          24KB

        • memory/2536-13-0x0000000001FA0000-0x0000000001FAF000-memory.dmp

          Filesize

          60KB

        • memory/2536-15-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB