Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
9d78d88f44801f6faca934696325e4d545281caa440648e5051c14702081bfff.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9d78d88f44801f6faca934696325e4d545281caa440648e5051c14702081bfff.exe
Resource
win10v2004-20230915-en
General
-
Target
9d78d88f44801f6faca934696325e4d545281caa440648e5051c14702081bfff.exe
-
Size
4.4MB
-
MD5
b9ab18f795cfd2be2060ceab9bca7f60
-
SHA1
03a9b61efa1ae4a8e216f5a1c4010d89bd5394be
-
SHA256
9d78d88f44801f6faca934696325e4d545281caa440648e5051c14702081bfff
-
SHA512
c3473a089e9e6dcb7312014d0020bac2427b5f4d4d15bcaaac524ac24b06360ea566d279879b9a1d5a74896dd292b90f163fb8cc7859158a97927e3e35270d9d
-
SSDEEP
49152:B0thI7W9A5i7PtAQ4q9PGCqYTSIy+/gqYY9:KiW9AY7PtAY9qYTSG/gY9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2044 9d78d88f44801f6faca934696325e4d545281caa440648e5051c14702081bfff.exe 2044 9d78d88f44801f6faca934696325e4d545281caa440648e5051c14702081bfff.exe 2044 9d78d88f44801f6faca934696325e4d545281caa440648e5051c14702081bfff.exe