Analysis

  • max time kernel
    152s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 12:46

General

  • Target

    d18de310377a4d056b09df8c68a0a25616fe5ce9d6b3f1c6653395978064f42e.exe

  • Size

    380KB

  • MD5

    01a51131071a8bd3acd1df6021f333f1

  • SHA1

    94e8c4a233ecff0484b08a009e3b00b19fb28d36

  • SHA256

    d18de310377a4d056b09df8c68a0a25616fe5ce9d6b3f1c6653395978064f42e

  • SHA512

    3a0b6171f764211964ca06ea4794f1b9a90a7a03c79d15d575dbcefc24f98bfc9f0c9c83c7e80f33004e98684bdad5c6006cd141b608507a75f1f1fc3746c2a7

  • SSDEEP

    1536:Wyql9mQwum4C4QSk/+Hggf1oryXS03iWYXPgxtaRMdGyzZv2eLSkKi63g9UlrRmX:dzuM4a/MpfCr/0NYXcaPylv2KSpgI

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d18de310377a4d056b09df8c68a0a25616fe5ce9d6b3f1c6653395978064f42e.exe
    "C:\Users\Admin\AppData\Local\Temp\d18de310377a4d056b09df8c68a0a25616fe5ce9d6b3f1c6653395978064f42e.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    PID:1836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1836-54-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1836-55-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB