Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 07:27

General

  • Target

    2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c.exe

  • Size

    1.2MB

  • MD5

    003b5373a5c5a4bdcef827a6ad335cc7

  • SHA1

    2f535266344cc774d506fa517aab97d74d0ea76a

  • SHA256

    2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c

  • SHA512

    ef3df7d2a5a9b8b2145e77ead4edb27db07d092d886f2ac3d94546974a96751f34fb940d4b1d88ccec4a443dbb4c3d5dd3ce4be68bb0394a16eb260fa4f91ab8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 49 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c.exe
    "C:\Users\Admin\AppData\Local\Temp\2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    PID:1448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads