Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 04:21

General

  • Target

    bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589.exe

  • Size

    336KB

  • MD5

    abad0ca5127c81b646b138f2c4c04689

  • SHA1

    3cc476dd8f2a8f8467ae3149a00222f6b56e2dd8

  • SHA256

    bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589

  • SHA512

    74c72522499755fe2c45227955b8e07ef3186219c3419085eea9a3965853337fb454eeb325c5cd34c9879a0b97d894ce5b4f625e8f81b7a705e4b8f2b35dc379

  • SSDEEP

    3072:/8Vhtn71gyCf+1TXyeqPlp+IywMGd8lDj9I7GMjg2vZ9uYWp+Xr5YuROHLs7A1h+:k5n71dCfciJpMxlf7HYkjpIzFA1A

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589.exe
    "C:\Users\Admin\AppData\Local\Temp\bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:2024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2024-54-0x00000000766D1000-0x00000000766D3000-memory.dmp

    Filesize

    8KB

  • memory/2024-55-0x0000000000160000-0x000000000019B000-memory.dmp

    Filesize

    236KB

  • memory/2024-56-0x0000000000880000-0x00000000008AF000-memory.dmp

    Filesize

    188KB

  • memory/2024-60-0x0000000000930000-0x0000000000957000-memory.dmp

    Filesize

    156KB

  • memory/2024-64-0x0000000000160000-0x000000000019B000-memory.dmp

    Filesize

    236KB