Analysis
-
max time kernel
193s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:47
Static task
static1
Behavioral task
behavioral1
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win10v2004-20230220-en
General
-
Target
a38740f27d72f631a071f9b8d4707b4c.exe
-
Size
238KB
-
MD5
a38740f27d72f631a071f9b8d4707b4c
-
SHA1
3dae530f1fa4329bdb10d79ae20fa56e77b19ae5
-
SHA256
967c720bf123abc4385306cd0ce6c25fa515b2c107c2ae6f670e4d863912a660
-
SHA512
da87468cebb4f835c6b5ca84bdef1852ec242e269173f344c85bab821e974dda16f7ce1d07c72c94916b8a59fade6e053a8bea3381e7702789ce5870c312e735
-
SSDEEP
6144:yKvu7/cjSdN2K5YU13i3o4Ms2eXAOt3va:yQEgSdNjeXby
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" a38740f27d72f631a071f9b8d4707b4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345.1MB
MD520d597dc5671cf224f690e6b1f03c863
SHA1d3b9f5f8bda203b97f65f6b7cd757966b263a77d
SHA2569fd3f1abd276c4a6c8e4c5a5d3d5058ce9eebc975eaa267c5a29fc0f57d820b6
SHA51222b70b56017bd428159d7f7524d90b42201955fecbe074d18eae87ed1ccad146dd89d2ac7768ad4ae1716a2f01b16b4205b5f5fd6bc9c637b48c5c359c3a7f9d