Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 13:17

General

  • Target

    a8e94a8c83a4a26e1cce0dfdce2088ba95d958e96c44beb2b60b6c11428c01c8.exe

  • Size

    382KB

  • MD5

    6abf2836443d80b8f2d6e8cc93ba5567

  • SHA1

    d72b651199819c198e133005f48dec290ac02a49

  • SHA256

    a8e94a8c83a4a26e1cce0dfdce2088ba95d958e96c44beb2b60b6c11428c01c8

  • SHA512

    d4a0d5973aef61fb34cb6ad680c489a7e7fb0f7df8fe90ae205fc89cee0fb786eaf50480aa9fcd84029c1175a303a77bcf0f822a41dedc75d560b940dbc16196

  • SSDEEP

    6144:T85hn1m6HMQeBQJY7ynZWcbcMq2zwReJH4pSAQfsYBqpRHKu:T8hm+MQ+QvwcbdnKHpSAZYBqvKu

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8e94a8c83a4a26e1cce0dfdce2088ba95d958e96c44beb2b60b6c11428c01c8.exe
    "C:\Users\Admin\AppData\Local\Temp\a8e94a8c83a4a26e1cce0dfdce2088ba95d958e96c44beb2b60b6c11428c01c8.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1220

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1220-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

          Filesize

          8KB

        • memory/1220-55-0x00000000003A0000-0x00000000003CF000-memory.dmp

          Filesize

          188KB

        • memory/1220-59-0x0000000004410000-0x0000000004437000-memory.dmp

          Filesize

          156KB