Analysis

  • max time kernel
    3s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 04:21

General

  • Target

    bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589.exe

  • Size

    336KB

  • MD5

    abad0ca5127c81b646b138f2c4c04689

  • SHA1

    3cc476dd8f2a8f8467ae3149a00222f6b56e2dd8

  • SHA256

    bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589

  • SHA512

    74c72522499755fe2c45227955b8e07ef3186219c3419085eea9a3965853337fb454eeb325c5cd34c9879a0b97d894ce5b4f625e8f81b7a705e4b8f2b35dc379

  • SSDEEP

    3072:/8Vhtn71gyCf+1TXyeqPlp+IywMGd8lDj9I7GMjg2vZ9uYWp+Xr5YuROHLs7A1h+:k5n71dCfciJpMxlf7HYkjpIzFA1A

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589.exe
    "C:\Users\Admin\AppData\Local\Temp\bb1f8a7b48ca98147d1280de350e7da153c21721e323debc128794153ce22589.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:5020

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5020-132-0x0000000003DE0000-0x0000000003E0F000-memory.dmp

          Filesize

          188KB

        • memory/5020-136-0x0000000000840000-0x000000000087B000-memory.dmp

          Filesize

          236KB

        • memory/5020-137-0x0000000004D80000-0x0000000004DA7000-memory.dmp

          Filesize

          156KB

        • memory/5020-141-0x0000000000840000-0x000000000087B000-memory.dmp

          Filesize

          236KB