Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 13:41

General

  • Target

    20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe

  • Size

    77KB

  • MD5

    67b9de377c2a0c570878bb3379a72640

  • SHA1

    852e1cc8dfe36db1953e5dbc24fa38508f66057f

  • SHA256

    20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509

  • SHA512

    676ec7ddf984382f3e9666978b3283581777035404d2d8e4329de416e1efca89005de62a18e6e6d9a1c964e584ade2ec8ada4b303b69a34af3b7b1f09282d922

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMF:TCjsIOtEvwDpj5HE/OUHnSMr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe
    "C:\Users\Admin\AppData\Local\Temp\20fc907df59fc3630376d8728ee7b7764192162660925475a646e8e2960aa509N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          77KB

          MD5

          3c454b1998000fb29859b5ab0e3092e4

          SHA1

          27df9ff54056c648f52223989acde2c1152b8bd5

          SHA256

          1386cf8a799febb7892a1d2568cf6e197ce5c443937f2cb2108d84477991f130

          SHA512

          da863de23727f6f9ab80f4c54f69d49fca77789e99e55cb608d5c6e080fd2f87bbf42fc875da3efcf9a129be4aa7310bdc01ef38a5bfee45fd1f21ba88133ca4

        • memory/2084-16-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2084-25-0x00000000002D0000-0x00000000002D6000-memory.dmp

          Filesize

          24KB

        • memory/2084-18-0x0000000000610000-0x0000000000616000-memory.dmp

          Filesize

          24KB

        • memory/2084-26-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2232-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2232-9-0x00000000001E0000-0x00000000001E6000-memory.dmp

          Filesize

          24KB

        • memory/2232-2-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2232-1-0x00000000001E0000-0x00000000001E6000-memory.dmp

          Filesize

          24KB

        • memory/2232-14-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB