Analysis

  • max time kernel
    177s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 04:07

General

  • Target

    ff6ca491d853481df3804e0b77e61d2246ce6318860ad4186a3bb0de48d9fbc0.exe

  • Size

    20KB

  • MD5

    8138ef5dea053822fb396bc1282e3280

  • SHA1

    98070287c1fe59234664381cce35d14b3e017ebb

  • SHA256

    ff6ca491d853481df3804e0b77e61d2246ce6318860ad4186a3bb0de48d9fbc0

  • SHA512

    a9214804a5f3bc26645f2a82bcf0464150827606babda812823b6a65fc08dfa21897e90564f90ac3621633837431601269f2c88fc0547cbf1ebb253991cd3f04

  • SSDEEP

    384:7LZPnqGM39DCVtLKubd/aZAMIzoldPzed1UjBTam9xO:Vr+wVtLKGdiAMIzySm9xO

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff6ca491d853481df3804e0b77e61d2246ce6318860ad4186a3bb0de48d9fbc0.exe
    "C:\Users\Admin\AppData\Local\Temp\ff6ca491d853481df3804e0b77e61d2246ce6318860ad4186a3bb0de48d9fbc0.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious behavior: RenamesItself
    PID:2816

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads