Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 14:35

General

  • Target

    84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932.exe

  • Size

    323KB

  • MD5

    bfdb8f8667e81c54bf2949e4efdf812c

  • SHA1

    8b299d08b13d68c440cb87181da06f83dfacccee

  • SHA256

    84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932

  • SHA512

    bb40f9e5c6341e02d2af17c6a5b8d2489ab4d5a547e73222065dbe17190abef5219c732ae061d2c1f58460f125b308355bb52ca689311fb5b9a251ebf7d2b8da

  • SSDEEP

    6144:Bmc567wc7vptFe+pjrT30WIvuFkB4dpHa7YtNMRk:p67B7vpPprT32uWB4dp60t2Rk

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932.exe
    "C:\Users\Admin\AppData\Local\Temp\84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1764-54-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB

  • memory/1764-55-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB

  • memory/1764-59-0x0000000000290000-0x00000000002B7000-memory.dmp

    Filesize

    156KB

  • memory/1764-63-0x00000000007A1000-0x00000000007CB000-memory.dmp

    Filesize

    168KB