Analysis

  • max time kernel
    175s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 02:04

General

  • Target

    FWD_2020080317368428389989134962381931603322231765263557.exe

  • Size

    730KB

  • MD5

    0d61b4602c75404e9602028386be0b64

  • SHA1

    205e954e6482520aa4b0a83010839d4e2a74a3ad

  • SHA256

    b5f13642aea2fab7e7172b1b93f7d154e80b1675de919b4b7b9f0c5b943ab67e

  • SHA512

    705687cbf0fa908945b7b81252e493a42e26a3fdc0f74b2c9018776399d00b3657218ef3bb280010b6ae9b68937da74681ab0b4c2b2b0c0f5bab3f8e9a789c69

Score
9/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\FWD_2020080317368428389989134962381931603322231765263557.exe
    "C:\Users\Admin\AppData\Local\Temp\FWD_2020080317368428389989134962381931603322231765263557.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    PID:4784

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4784-130-0x0000000000660000-0x000000000071E000-memory.dmp
    Filesize

    760KB

  • memory/4784-131-0x0000000005080000-0x000000000511C000-memory.dmp
    Filesize

    624KB

  • memory/4784-132-0x00000000056D0000-0x0000000005C74000-memory.dmp
    Filesize

    5.6MB

  • memory/4784-133-0x00000000051C0000-0x0000000005252000-memory.dmp
    Filesize

    584KB

  • memory/4784-134-0x0000000005150000-0x000000000515A000-memory.dmp
    Filesize

    40KB

  • memory/4784-135-0x0000000005350000-0x00000000053A6000-memory.dmp
    Filesize

    344KB

  • memory/4784-136-0x0000000005FB0000-0x0000000006016000-memory.dmp
    Filesize

    408KB