Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2023 20:33

General

  • Target

    da4d453d6add60c1abdf0d814b43cdb6b92c2f885f38c745000e31928cdcd6d3.exe

  • Size

    917KB

  • MD5

    e0b6365397f74c259e1a9437122fa46c

  • SHA1

    c80144ca6f8361ecd8944716d77ffa9417d6b56b

  • SHA256

    da4d453d6add60c1abdf0d814b43cdb6b92c2f885f38c745000e31928cdcd6d3

  • SHA512

    814d026745089c238e4afd80fc729dc9f554f8509171c9ee2b2aaaf9e6188cb7e080f4f23b6e6fa2f7e38695d3553dfbcf36c8eaa2174c3a8c363549cf50795c

  • SSDEEP

    24576:KpvDiGFkmSAvzNjH1h/dWMZqTs+4tEZH6:KpvDiGFvSSzBH1h/dWMZqT

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da4d453d6add60c1abdf0d814b43cdb6b92c2f885f38c745000e31928cdcd6d3.exe
    "C:\Users\Admin\AppData\Local\Temp\da4d453d6add60c1abdf0d814b43cdb6b92c2f885f38c745000e31928cdcd6d3.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1544-0-0x00007FF765AA0000-0x00007FF765B8C000-memory.dmp

    Filesize

    944KB

  • memory/1544-6-0x000002081CC10000-0x000002081CC8B000-memory.dmp

    Filesize

    492KB

  • memory/1544-7-0x000002081CC90000-0x000002081CC91000-memory.dmp

    Filesize

    4KB

  • memory/1544-9-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/1544-10-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/1544-11-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/1544-12-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/1544-13-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/1544-15-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB