Overview
overview
8Static
static
7msdrives/driverpp.sys
windows7-x64
1msdrives/driverpp.sys
windows10-2004-x64
1msdrives/iedrives.dll
windows7-x64
6msdrives/iedrives.dll
windows10-2004-x64
6msdrives/msdrv.exe
windows7-x64
5msdrives/msdrv.exe
windows10-2004-x64
5msdrives/m...rl.exe
windows7-x64
8msdrives/m...rl.exe
windows10-2004-x64
8Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 01:47
Behavioral task
behavioral1
Sample
msdrives/driverpp.sys
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msdrives/driverpp.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
msdrives/iedrives.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msdrives/iedrives.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
msdrives/msdrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
msdrives/msdrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
msdrives/msdrvctrl.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
msdrives/msdrvctrl.exe
Resource
win10v2004-20240802-en
General
-
Target
msdrives/msdrv.exe
-
Size
67KB
-
MD5
6d9ec31b17f13479b1dcdeb3a790883e
-
SHA1
1302901cc26a559437a18bc0b9d0f2ba4039fff2
-
SHA256
ebf88afee2655dada60a0dea072e0b803ec5d228ca2c20727b76488c7afbc014
-
SHA512
de35c3dbceafaa75fdefa7182bb434073fe0c4abee734fb8a7c09eba5bfbb0121544975e86916765387f93da60bbef144d2e258ae42e0068272620bcd86202f1
-
SSDEEP
1536:eJgHv2qSN7qqOugDy6WUGLr5bq9n0waMJhU1ITSDi0:eJgHv2qIWe7UGLFWOcfTSDf
Malware Config
Signatures
-
resource yara_rule behavioral6/memory/1972-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral6/memory/4444-2-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral6/memory/2536-3-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral6/memory/1972-6-0x0000000000400000-0x000000000042B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdrv.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1972 msdrv.exe 1972 msdrv.exe 4444 msdrv.exe 4444 msdrv.exe 2536 msdrv.exe 2536 msdrv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 4444 1972 msdrv.exe 82 PID 1972 wrote to memory of 4444 1972 msdrv.exe 82 PID 1972 wrote to memory of 4444 1972 msdrv.exe 82 PID 1972 wrote to memory of 2536 1972 msdrv.exe 83 PID 1972 wrote to memory of 2536 1972 msdrv.exe 83 PID 1972 wrote to memory of 2536 1972 msdrv.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\msdrives\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\msdrives\msdrv.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\msdrives\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\msdrives\msdrv.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\msdrives\msdrv.exe"C:\Users\Admin\AppData\Local\Temp\msdrives\msdrv.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-