Analysis

  • max time kernel
    20s
  • max time network
    79s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    31-01-2022 21:48

General

  • Target

    02f30494c0096b34275fe0c5fdb37e6280a82492a728712ec9b5226e86111d1c.exe

  • Size

    13KB

  • MD5

    341e51206dfcf26c5179cf39417e997a

  • SHA1

    7f0d2f7bcd30c3226a792472612c0273962f6115

  • SHA256

    02f30494c0096b34275fe0c5fdb37e6280a82492a728712ec9b5226e86111d1c

  • SHA512

    34ea58a2c93308540182bcd1d612482237d411f62f35f3bb0bf962fac24d02eafa86a7c8327c0539d0043ddf00f7c38f1f1ae04cf9d077c0e6192712cd1226c3

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 1 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02f30494c0096b34275fe0c5fdb37e6280a82492a728712ec9b5226e86111d1c.exe
    "C:\Users\Admin\AppData\Local\Temp\02f30494c0096b34275fe0c5fdb37e6280a82492a728712ec9b5226e86111d1c.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads