Overview
overview
8Static
static
7msdrives/driverpp.sys
windows7-x64
1msdrives/driverpp.sys
windows10-2004-x64
1msdrives/iedrives.dll
windows7-x64
6msdrives/iedrives.dll
windows10-2004-x64
6msdrives/msdrv.exe
windows7-x64
5msdrives/msdrv.exe
windows10-2004-x64
5msdrives/m...rl.exe
windows7-x64
8msdrives/m...rl.exe
windows10-2004-x64
8Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 01:47
Behavioral task
behavioral1
Sample
msdrives/driverpp.sys
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msdrives/driverpp.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
msdrives/iedrives.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msdrives/iedrives.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
msdrives/msdrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
msdrives/msdrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
msdrives/msdrvctrl.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
msdrives/msdrvctrl.exe
Resource
win10v2004-20240802-en
General
-
Target
msdrives/msdrv.exe
-
Size
67KB
-
MD5
6d9ec31b17f13479b1dcdeb3a790883e
-
SHA1
1302901cc26a559437a18bc0b9d0f2ba4039fff2
-
SHA256
ebf88afee2655dada60a0dea072e0b803ec5d228ca2c20727b76488c7afbc014
-
SHA512
de35c3dbceafaa75fdefa7182bb434073fe0c4abee734fb8a7c09eba5bfbb0121544975e86916765387f93da60bbef144d2e258ae42e0068272620bcd86202f1
-
SSDEEP
1536:eJgHv2qSN7qqOugDy6WUGLr5bq9n0waMJhU1ITSDi0:eJgHv2qIWe7UGLFWOcfTSDf
Malware Config
Signatures
-
resource yara_rule behavioral5/memory/2120-2-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral5/memory/2120-0-0x0000000000400000-0x000000000042B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2120 msdrv.exe 2120 msdrv.exe