Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2023 03:52

General

  • Target

    8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe

  • Size

    15.5MB

  • MD5

    839c4e892c011d678e65a3ab45e88b65

  • SHA1

    336d7f2811107584ce7977afea5b59395e05b0ea

  • SHA256

    8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c

  • SHA512

    c6805d0c8004563c3d16c86380884e635602f0aa86f2344c9680796a9384ebd8a345463d64ae7850be527459503c79923b50b944d9598426111fc372f83f1cd2

  • SSDEEP

    393216:TV2ufUwuX4DCdSaqGDLX+onV6tVssPKCq8dLru94HFlgn:TVnc5X3fqGDLOKo/7KChRrU4Tgn

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe
    "C:\Users\Admin\AppData\Local\Temp\8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\NetDragon\101PPT\ChannelInfo.ini

    Filesize

    90B

    MD5

    aeffaa75080c668451d0d7bdcf3d0c81

    SHA1

    37adc5f9ab71c8d2e89ef17778afb2f2de34d3aa

    SHA256

    f7b12ac43e43aacc4db9e6bc735ed6326215e49ba63e8b972e34a19f3c5cc285

    SHA512

    a290a5253514d737471301ae01880acb8ac59f98cdb7c8d2d2771d301e19f44fdfbc6d2718a9822e14ab484e7c823264c5ccf959f6941987578c556326367251