Analysis

  • max time kernel
    143s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2023 02:07

General

  • Target

    73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe

  • Size

    2.2MB

  • MD5

    3f0d37881a8c7af5d7c98c89130c6291

  • SHA1

    a7f4347e9ee3f2c6baf954356fe0f19e5330a120

  • SHA256

    73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921

  • SHA512

    4e91dfb8d2e2d981f55518fb03391f88e076c16fffaa3a84e0cd973e832f077c8d0d1f65d952b3a5d4bc3a01726d92f688fc7e4bf0d0e6cd9e2b896b1093d64b

  • SSDEEP

    49152:GmgyrMB83RZiIXgFPtJg3MVn2u7wB4z9b5ONRn:cyyKRZiIuW3MVn2qiQ5sNt

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe
    "C:\Users\Admin\AppData\Local\Temp\73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2824-0-0x0000000000400000-0x000000000081B000-memory.dmp

    Filesize

    4.1MB

  • memory/2824-1-0x0000000000400000-0x000000000081B000-memory.dmp

    Filesize

    4.1MB

  • memory/2824-2-0x00000000003D0000-0x00000000003D8000-memory.dmp

    Filesize

    32KB

  • memory/2824-3-0x0000000002310000-0x0000000002320000-memory.dmp

    Filesize

    64KB

  • memory/2824-5-0x0000000000400000-0x000000000081B000-memory.dmp

    Filesize

    4.1MB

  • memory/2824-10-0x0000000000400000-0x000000000081B000-memory.dmp

    Filesize

    4.1MB

  • memory/2824-14-0x0000000002310000-0x0000000002320000-memory.dmp

    Filesize

    64KB