Analysis
-
max time kernel
192s -
max time network
243s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 14:00
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
General
-
Target
tmp.exe
-
Size
121KB
-
MD5
10ba52c29d1002840756e2277b5a1e19
-
SHA1
e58435432811cb912fa23d49951bb53be7e90cd9
-
SHA256
4a4ee8cf217c1b548784ca42d0f6efce40f81da1424d1c94c35052a5b57403db
-
SHA512
2f254f971f221c3a6c2e821ff0cc251e6149fcf004ff366bbadfc7827196102d2fa6d4eeab6273204d4150017c9019bf85f475fbda55d5adc204e37e1d5ac04a
-
SSDEEP
3072:ukOplcjVhQcR45bea6QB6vbFSYWdZlOJMM1pNovofL:urlwH4D6Q0vbgY9JM8pNmofL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 548 tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
647B
MD539902ab5fc557e47d08a6217872730e1
SHA1ad70586cc90e84b10baa5c7b2f6c995d6025fca0
SHA256326175a465441ea00377a913b5e2d03d992b0d880bc2b61fedef2c7e4bce9190
SHA5125a9dd55688bdb7c7502ab7d14b03748be4254b95f88ab2e5f045194398954c3d61d7da33b490f9634d7845d5b6bb7825b5aeafe9ba7b70d1a11e48a1711a3846
-
Filesize
661B
MD5f968e3c63b52ad74a06727d57f441c6a
SHA1219108617827fc27dc36676b0a9ec3c383e3f14c
SHA256d4674bf6df8871b460db478107787f1178e2c5d1ed51aef665fa9562f71683b7
SHA512b196e93ad74e7369aaf3c3ee8a48ee9286fb662edbd85a3836121ee728863c524d6d7966a968324480a819aa3f84e0c9e3e3842de91511f8b178d563653e789f