Analysis

  • max time kernel
    44s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 13:50

General

  • Target

    ed86ed8243ccf7ada88066e209e40d91edeefea3fbe67f5898188f7fe2cdd1f8.exe

  • Size

    321KB

  • MD5

    0f6351f36ac463407d78f0819d41197c

  • SHA1

    e13d636cd7da56a585356ef0d82d7343298a016d

  • SHA256

    ed86ed8243ccf7ada88066e209e40d91edeefea3fbe67f5898188f7fe2cdd1f8

  • SHA512

    a847a77b8edbc5f93212ea5d79a0ba65fb44e762bf59a3a4fdf648b8e3ce8ad5a8b73d5e1d5cb2ac97a60dc5236ab6c4143e7f4027511566efcfa550bf16f39a

  • SSDEEP

    6144:ZTqHtSTcRljEwi46AlL/kLwYz8CWgRxcEtTm1Z/0I5NCmV:4NSTUjEwitnzrRxK70I5AmV

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed86ed8243ccf7ada88066e209e40d91edeefea3fbe67f5898188f7fe2cdd1f8.exe
    "C:\Users\Admin\AppData\Local\Temp\ed86ed8243ccf7ada88066e209e40d91edeefea3fbe67f5898188f7fe2cdd1f8.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1048-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/1048-55-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB

  • memory/1048-59-0x00000000000B0000-0x00000000000D7000-memory.dmp

    Filesize

    156KB

  • memory/1048-63-0x0000000001231000-0x000000000125B000-memory.dmp

    Filesize

    168KB