Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe
-
Size
95KB
-
MD5
14a7fda98e69d39d2da3f4c1e3b5da80
-
SHA1
3e9c562754526cff402d6d79ffd90b58ca2b7ef1
-
SHA256
eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76
-
SHA512
199ae2ffff6e4b1d02b534996b9551b5e18f10047a76eec8499d0cd052851bb6b366d72fc8694677cba48f96b8feb7856bbf833d40fe497f972db6e6745c0e68
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRiWCCy9lI6Tpj/:i5nkFGMOtEvwDpjNbwQEIieq/j/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2148 2424 eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe 30 PID 2424 wrote to memory of 2148 2424 eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe 30 PID 2424 wrote to memory of 2148 2424 eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe 30 PID 2424 wrote to memory of 2148 2424 eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe"C:\Users\Admin\AppData\Local\Temp\eaa1dbc31ef501ebf5097279c8f240cd66d3bc4a434486bfb1a0ed2cef326d76N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5ae694e9a9b8c1b0f6af296a97ca5922b
SHA17a16c813d7703f0e246a96903fa324c93cec9acf
SHA2564ffa82ca141920648cbfee8994fc14e9d58fbc146db993602082484706084217
SHA5128746520f7241dc557dd6b0efb53c3f32a2c5d8f4a3f97f9f82239c756581be69990e9bc46ca2b0e7a827c3ea03c159526b574fd1feada9fd54e58a82486b414f