Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 23:01

General

  • Target

    DPlayerGR(play.jb51.net)/file_proxy.exe

  • Size

    1.8MB

  • MD5

    4014851acc2c5d219bc5962d1c7c3a23

  • SHA1

    ccae9357806fe7e072f375c65cee690f5f2a35d0

  • SHA256

    6130d3761d8fb3e244f6262dbceff2e168f0625cf0f22553ae98e06e7c02cd67

  • SHA512

    816cb793b1fd3567a54eb1e1d2c54cd0ab93e556f38ff6fbda39f7caadc41108c110b6c4ecf334c61e0419212815d9a41c1ee3589ef82b5e422a957143995e28

  • SSDEEP

    24576:19aPQwNBvbUwz1HfleFjsrhgJJsGnneZarZeTWMo/buzqZ8bi0T8Vw932FubJ:cBvom1CnXGWLX0TF32Fut

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DPlayerGR(play.jb51.net)\file_proxy.exe
    "C:\Users\Admin\AppData\Local\Temp\DPlayerGR(play.jb51.net)\file_proxy.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1444-132-0x0000000003020000-0x000000000311F000-memory.dmp

    Filesize

    1020KB