Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2023 03:50

General

  • Target

    63283f920f05522a024de52e05b726472f694c90ee318298e450b7e342e750dc.exe

  • Size

    4.9MB

  • MD5

    b72fe8f4daec448ba9d79e9b58d85f49

  • SHA1

    5a4002da9b158c533eb0efe892f2eb736ed731b6

  • SHA256

    63283f920f05522a024de52e05b726472f694c90ee318298e450b7e342e750dc

  • SHA512

    fd439844241ccd3171892383fb35f4d94d6dc4bd202fef7495cec2c11faa98b6e58426b9079b08a7c1454f62bd771fbf6ea20a1653190a087f952887f6e44174

  • SSDEEP

    98304:kf4EIDDHK9nhCbJzEaokXvLZw8jzcO/7KNQS8r7NL5j5tDo3STwK7zUFBVEWUsqc:Q4HKDQBKkXy+XWt815j5tDobSUFQ14T

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\63283f920f05522a024de52e05b726472f694c90ee318298e450b7e342e750dc.exe
    "C:\Users\Admin\AppData\Local\Temp\63283f920f05522a024de52e05b726472f694c90ee318298e450b7e342e750dc.exe"
    1⤵
    • Enumerates connected drives
    PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1596-54-0x0000000000400000-0x0000000000CB9000-memory.dmp

    Filesize

    8.7MB

  • memory/1596-55-0x00000000001C0000-0x00000000001C3000-memory.dmp

    Filesize

    12KB

  • memory/1596-56-0x0000000000400000-0x0000000000CB9000-memory.dmp

    Filesize

    8.7MB

  • memory/1596-58-0x0000000000400000-0x0000000000CB9000-memory.dmp

    Filesize

    8.7MB

  • memory/1596-59-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1596-60-0x0000000003610000-0x00000000036C7000-memory.dmp

    Filesize

    732KB

  • memory/1596-61-0x0000000000400000-0x0000000000CB9000-memory.dmp

    Filesize

    8.7MB

  • memory/1596-63-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1596-64-0x0000000003610000-0x00000000036C7000-memory.dmp

    Filesize

    732KB