Analysis

  • max time kernel
    54s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 17:11

General

  • Target

    a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe

  • Size

    72KB

  • MD5

    8b614c4920dc4c31a936c61d148fc00d

  • SHA1

    10f50e017b001eb70627898da8b49a0b97bd14e4

  • SHA256

    a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117

  • SHA512

    b2eb2b6f69462bc7c2f4157ad31fa36cf216aba6144f9f96925d8c746789b3f0f89ad5307a654fe0c18dbf02b0ba85e0e602af39845943196d4c546df72e0680

  • SSDEEP

    768:tPwgRUmSHjgHJnF1SdUkHkrEMmrrfWSPqRNEO0YchqAtAuz:tIgRUrHjgHVfTkHvKRf0YKtA+

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
    "C:\Users\Admin\AppData\Local\Temp\a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of SetWindowsHookEx
    PID:536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads