Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe
Resource
win10v2004-20240802-en
General
-
Target
20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe
-
Size
77KB
-
MD5
67b9de377c2a0c570878bb3379a72640
-
SHA1
852e1cc8dfe36db1953e5dbc24fa38508f66057f
-
SHA256
20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509
-
SHA512
676ec7ddf984382f3e9666978b3283581777035404d2d8e4329de416e1efca89005de62a18e6e6d9a1c964e584ade2ec8ada4b303b69a34af3b7b1f09282d922
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMF:TCjsIOtEvwDpj5HE/OUHnSMr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2084 2232 20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe 31 PID 2232 wrote to memory of 2084 2232 20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe 31 PID 2232 wrote to memory of 2084 2232 20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe 31 PID 2232 wrote to memory of 2084 2232 20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe"C:\Users\Admin\AppData\Local\Temp\20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD53c454b1998000fb29859b5ab0e3092e4
SHA127df9ff54056c648f52223989acde2c1152b8bd5
SHA2561386cf8a799febb7892a1d2568cf6e197ce5c443937f2cb2108d84477991f130
SHA512da863de23727f6f9ab80f4c54f69d49fca77789e99e55cb608d5c6e080fd2f87bbf42fc875da3efcf9a129be4aa7310bdc01ef38a5bfee45fd1f21ba88133ca4