Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 01:44
Behavioral task
behavioral1
Sample
469a4a37ee0676988218534edf944697.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
469a4a37ee0676988218534edf944697.exe
Resource
win10v2004-20240226-en
General
-
Target
469a4a37ee0676988218534edf944697.exe
-
Size
94KB
-
MD5
469a4a37ee0676988218534edf944697
-
SHA1
54efc00707bb9de5893a42eb2ea7507ea1f98ace
-
SHA256
07bfb087ac19a4a309e15b850b52c489945c0196bf4dd0968454ca7aeccf54a4
-
SHA512
69c69bf0ecd70c8acf4f348f8c29712ca5750db8c295ac8fdbec7cf292c866798af774ce5a7a4dc60c96bf60dd698ad03194f32889824b8e747c4b0b653a658a
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bl:zCsanOtEvwDpjBB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2636 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2836 469a4a37ee0676988218534edf944697.exe -
resource yara_rule behavioral1/memory/2836-2-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c000000012253-11.dat upx behavioral1/memory/2636-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2636-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2636 2836 469a4a37ee0676988218534edf944697.exe 28 PID 2836 wrote to memory of 2636 2836 469a4a37ee0676988218534edf944697.exe 28 PID 2836 wrote to memory of 2636 2836 469a4a37ee0676988218534edf944697.exe 28 PID 2836 wrote to memory of 2636 2836 469a4a37ee0676988218534edf944697.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\469a4a37ee0676988218534edf944697.exe"C:\Users\Admin\AppData\Local\Temp\469a4a37ee0676988218534edf944697.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD52e2e23679886e56bb86732e9bd3f9651
SHA140a3e8c254561ab35db720f34b2f562af3562381
SHA25698fb3b7dbeb1bcdbbdb0a702d0789972335b24b2d97f194c71cc027a4e5bdd3c
SHA512bd6c01ccb9e4c2437bfe8bd1678dac9a0a5c03fea4a69768b2e28d4e0d9b3eb6c889887578c4f02c422316bc9ebe5bb24ffdb7584922e1edeafcf939b9691bc5