Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe
Resource
win10v2004-20241007-en
General
-
Target
022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe
-
Size
59KB
-
MD5
93da6bfccfa9e58be3aeb07ba9c96ce0
-
SHA1
29b78b78c1e9dea52d46e66e3d77da4230ee1fb3
-
SHA256
022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81
-
SHA512
002e07132ebbf4ec9525883133249691338a1fc6df7ee1e693f0052461353104af65e94d13e8688626f88e6beb23b74e43eec33255256e7b6831b4657de84eb7
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMTUe:TCjsIOtEvwDpj5HE/OUHnSMO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2780 2192 022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe 30 PID 2192 wrote to memory of 2780 2192 022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe 30 PID 2192 wrote to memory of 2780 2192 022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe 30 PID 2192 wrote to memory of 2780 2192 022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe"C:\Users\Admin\AppData\Local\Temp\022db8d5d885b43479765b681f8e209aa32b5c57b80a1c0749c584eb0dd0dc81N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD50afef4325798b5280e7021abf0d43cae
SHA18720ef45cefe49fe96bc5d7451ce30889024c9b9
SHA256d52d8eb0e2cf4961f1a4e7941b190e59489cbec4b4b1fef9f41987e62485b9b3
SHA512279a0b3c5427a6728b9e720617b8c1ec3b17df95c7da3b8f3f79ac0eeadf4e85aabc085c7368b75bd30d66b1d6a20ac0efc074e7913411265702104610abc40b