Analysis

  • max time kernel
    91s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 14:35

General

  • Target

    84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932.exe

  • Size

    323KB

  • MD5

    bfdb8f8667e81c54bf2949e4efdf812c

  • SHA1

    8b299d08b13d68c440cb87181da06f83dfacccee

  • SHA256

    84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932

  • SHA512

    bb40f9e5c6341e02d2af17c6a5b8d2489ab4d5a547e73222065dbe17190abef5219c732ae061d2c1f58460f125b308355bb52ca689311fb5b9a251ebf7d2b8da

  • SSDEEP

    6144:Bmc567wc7vptFe+pjrT30WIvuFkB4dpHa7YtNMRk:p67B7vpPprT32uWB4dp60t2Rk

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932.exe
    "C:\Users\Admin\AppData\Local\Temp\84aad694638e60c3c6f7c0cb0250bc29cfb0f1c7a048925fb4f05dbdd27cd932.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:2292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2292-132-0x0000000001E50000-0x0000000001E7F000-memory.dmp

    Filesize

    188KB

  • memory/2292-136-0x0000000001EC0000-0x0000000001EE7000-memory.dmp

    Filesize

    156KB

  • memory/2292-140-0x00000000013B0000-0x00000000014B0000-memory.dmp

    Filesize

    1024KB