Analysis

  • max time kernel
    107s
  • max time network
    129s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/07/2023, 13:18

General

  • Target

    3DSimED3.exe

  • Size

    9.8MB

  • MD5

    7ecbb0eb71125877250dc95c2b64e0ce

  • SHA1

    83cdd52dcc7d362cfa8e5d566e67c489c624240c

  • SHA256

    d4cc087193d2d1896f3553e29ec1cb3151b31e13d4c14370af35f2bbc470a82d

  • SHA512

    5d4d370f87cb1712d01867d0ad575acc2c297fd6be4f480dfa6df5bdb090538c9d963d5c4fad76564e0fed80e1531f6af24b2af8b06c6484bd3d1c3528d8deaa

  • SSDEEP

    196608:RasYJKYcq6iILBhphYMOvMkb3QV2HWbTO6gvwVTFLOyomFHKnP:uJBgOMG3QVIiO6rVTF

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3DSimED3.exe
    "C:\Users\Admin\AppData\Local\Temp\3DSimED3.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks processor information in registry
    PID:3116

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\LE34T\PCGWIN32.LI5

          Filesize

          2KB

          MD5

          b74ab4df72b2c999c53fb650763dd85e

          SHA1

          072de86d38062098a92fafe9c77e3eb2010e4f03

          SHA256

          9da8892e42c8575433fc19d19fdfe4e08b348049e197523ffe0b2955441d8c8a

          SHA512

          17d801fcd617b0973317b598cc0157e64b3bae578df261ac52e4dcbdad8ff4a406c6ab0702584ea27d45ae1f633f6583a3781d3751d0f9b168d53218e51b4c64

        • memory/3116-122-0x0000000000400000-0x0000000000DDB000-memory.dmp

          Filesize

          9.9MB

        • memory/3116-134-0x0000000000400000-0x0000000000DDB000-memory.dmp

          Filesize

          9.9MB