Analysis

  • max time kernel
    179s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 10:49

General

  • Target

    bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe

  • Size

    340KB

  • MD5

    1abe4e8e4406bab84a2259e0e3ad4d84

  • SHA1

    91674d3072f2ad7c19b55ef0ac9d744307222b5a

  • SHA256

    bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f

  • SHA512

    963f8bfc940cb410dd5ee84a4f5225f0cc60fa2e63ab19e2f7430424c2b6ccfe8467f0294bd0e671785e9adaa88971e6e832224c01e47f0e8884257dc516156f

  • SSDEEP

    6144:M0yJCI8vCb/Y8/eU6+9m4tU0rEXNG2fbro:M78eTePXj0ryNLbro

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe
    "C:\Users\Admin\AppData\Local\Temp\bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:4696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4696-132-0x0000000001D00000-0x0000000001D2F000-memory.dmp

    Filesize

    188KB

  • memory/4696-136-0x0000000004D20000-0x0000000004D47000-memory.dmp

    Filesize

    156KB