Analysis
-
max time kernel
118s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
74b65a52454f10710c66dc81787c9440N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74b65a52454f10710c66dc81787c9440N.exe
Resource
win10v2004-20240709-en
General
-
Target
74b65a52454f10710c66dc81787c9440N.exe
-
Size
395KB
-
MD5
74b65a52454f10710c66dc81787c9440
-
SHA1
cdb5b97540f28b6d87add098017fca9409e2edae
-
SHA256
27d0282d571f75ad2f92ac3c363ec4245361e4f4f4d2472309886b62e216cfa8
-
SHA512
2e490c0910442e22cbfe8d1f9fa779801d05c05f5b14da4162798a5e5d7be9720d2425719371f5ca8cb63b9e90c336e2d102914b47042a771ac5b7a568712e1a
-
SSDEEP
12288:4jauDReWpNrXhFooE++n3/iQd7oQpYSKdJeuG05:4DDFFRFooE++3ld7oQpjKdqU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4616 mdaic.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\mdaic.exe" mdaic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74b65a52454f10710c66dc81787c9440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdaic.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4616 4492 74b65a52454f10710c66dc81787c9440N.exe 88 PID 4492 wrote to memory of 4616 4492 74b65a52454f10710c66dc81787c9440N.exe 88 PID 4492 wrote to memory of 4616 4492 74b65a52454f10710c66dc81787c9440N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b65a52454f10710c66dc81787c9440N.exe"C:\Users\Admin\AppData\Local\Temp\74b65a52454f10710c66dc81787c9440N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\ProgramData\mdaic.exe"C:\ProgramData\mdaic.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD587b7ae13378a0952251719afccaab530
SHA1786df1583dc1608058781229830dcecc1a08764e
SHA256d26287b902d50649e1b8c9bd1661051a8511915c66a3c62d8734744ab6930dad
SHA5121b735471e93159fb5fa61d7df7e2e6dd5d48e305682c18ec56427175a3f70398848a7b6ff9ea08d9651f060f4c4be9312d3758d83c330e038970c2cef0e62c95
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
258KB
MD56905a6eceafbe6a0da443461eed3a8de
SHA1f840ea450880174905a94486c40182428f6407d2
SHA2568afab0186f02bed8ccf6f2ca5eba45275471f5f55824ad461443e2cd98ffde54
SHA51292faa6dde75494d83a2f931ee39fea41a657eb7e2eb6d3ee920cc50ddf0fe139dfffaa4326c22953ef363502b95f327c7cd73d28c9fa8eb907f0c19285f30288