Analysis

  • max time kernel
    89s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 13:09

General

  • Target

    73fb4ba2a54cdb08f5e6f88fddc283ae1c71878bcec85cb52be05f6fd3bfd574.exe

  • Size

    366KB

  • MD5

    2a3c4a7d14293283d71eb5aa5abba166

  • SHA1

    afb2f358c509b6e5788b5a9f5f07813a6c8a6a47

  • SHA256

    73fb4ba2a54cdb08f5e6f88fddc283ae1c71878bcec85cb52be05f6fd3bfd574

  • SHA512

    2a88bd9e8ebf76567977065cfbd8b94fd15e657e993ff22a062cf251925c466d6348bb6d9aa0ff9beecdb8eedc4f3d13337e4b18f23dbf26e3dc080dd61048a5

  • SSDEEP

    6144:llrbhp6z9dIcea10yHTRPPYU+1ZPjhnvrLcfFEvmuKOb/l:b/hp6z9qW0OPP7+17zYfFamGR

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73fb4ba2a54cdb08f5e6f88fddc283ae1c71878bcec85cb52be05f6fd3bfd574.exe
    "C:\Users\Admin\AppData\Local\Temp\73fb4ba2a54cdb08f5e6f88fddc283ae1c71878bcec85cb52be05f6fd3bfd574.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads