Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2023, 03:09

General

  • Target

    dlq.exe

  • Size

    3.0MB

  • MD5

    53ada198b45f7d62148ee58b90dea4db

  • SHA1

    2099deff4b98c0aad183e223eba96847374b9343

  • SHA256

    28801cb8bdda78bec1535221b45cf2d5120fccce72820af3ae8b3f740d116d86

  • SHA512

    364c170c8095bc44992ba43000f94cfdb73734689834c1305475caf2372dc236e2a931a674e2c6697b5ddcde904ca7e4f3ffd63e2b12992faa37fbe25202521e

  • SSDEEP

    24576:y6yXwK1SKZQyJ+bYhoxSaFWIpA3yDDGws239GN2:/M2jIoWIqI39K2

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dlq.exe
    "C:\Users\Admin\AppData\Local\Temp\dlq.exe"
    1⤵
    • Enumerates connected drives
    PID:5072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5072-133-0x0000000000A00000-0x0000000000A01000-memory.dmp

          Filesize

          4KB

        • memory/5072-134-0x0000000000400000-0x0000000000702000-memory.dmp

          Filesize

          3.0MB

        • memory/5072-135-0x0000000000A00000-0x0000000000A01000-memory.dmp

          Filesize

          4KB

        • memory/5072-136-0x0000000000400000-0x0000000000702000-memory.dmp

          Filesize

          3.0MB

        • memory/5072-137-0x0000000000400000-0x0000000000702000-memory.dmp

          Filesize

          3.0MB

        • memory/5072-138-0x0000000000400000-0x0000000000702000-memory.dmp

          Filesize

          3.0MB

        • memory/5072-139-0x0000000000400000-0x0000000000702000-memory.dmp

          Filesize

          3.0MB