Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 13:31

General

  • Target

    bfce95d18186877eb8d91fcdf82eb5c8c843eebf61c90195df5ec41ebc0ba006.exe

  • Size

    261KB

  • MD5

    44af54adb1f206f37e8210c0a36a69dd

  • SHA1

    ff801caafacd04b0bc0263eb536317558c259d6b

  • SHA256

    bfce95d18186877eb8d91fcdf82eb5c8c843eebf61c90195df5ec41ebc0ba006

  • SHA512

    6bf3c65c8a29e9b32d4916d88e6734ee7b9326e30ea14a8c545674ff907492195a7354453e02627e053c5206252368c3856e5eee6750d77a8bbedc60c7e604ca

  • SSDEEP

    3072:SP0N7jyXHfB7BT218jzSwLe0OdDqOyyyXbO6E2Q1PoR7bVzNeeFqnqeTY/piTIA:Se/yXJSwLp1OyycxELKpUwqnqV/piTIA

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfce95d18186877eb8d91fcdf82eb5c8c843eebf61c90195df5ec41ebc0ba006.exe
    "C:\Users\Admin\AppData\Local\Temp\bfce95d18186877eb8d91fcdf82eb5c8c843eebf61c90195df5ec41ebc0ba006.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1172

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1172-54-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/1172-55-0x00000000001F0000-0x000000000021F000-memory.dmp

    Filesize

    188KB

  • memory/1172-59-0x0000000000780000-0x00000000007A7000-memory.dmp

    Filesize

    156KB