Analysis

  • max time kernel
    163s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 14:36

General

  • Target

    6d1702087b7aeddad67dfcc17824a79767078a7c8a9ce8a67c848ce8e27a159d.exe

  • Size

    9.3MB

  • MD5

    b340d4d00119ff6f8468a13429decb04

  • SHA1

    9f383b3a5d9d5e556e5468f5af2c1dff33d6f8dc

  • SHA256

    6d1702087b7aeddad67dfcc17824a79767078a7c8a9ce8a67c848ce8e27a159d

  • SHA512

    3372d2c279b2775cbb1be730d4e4eb169d019ab0fe17aa907e66335d198a11775cbace6d16810ef89324b68f507d16370bdda1efb6cef1b18a852d35d6d14ea8

  • SSDEEP

    196608:trvIOGT0uaarBrFtDH5hTB5IaXSu9FyAxTUy79IPGuucF:NW07aBbTToaXSufyAxTUy79IPfucF

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d1702087b7aeddad67dfcc17824a79767078a7c8a9ce8a67c848ce8e27a159d.exe
    "C:\Users\Admin\AppData\Local\Temp\6d1702087b7aeddad67dfcc17824a79767078a7c8a9ce8a67c848ce8e27a159d.exe"
    1⤵
    • Checks BIOS information in registry
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2248-0-0x0000000000400000-0x00000000007CB000-memory.dmp

    Filesize

    3.8MB

  • memory/2248-1-0x0000000000400000-0x00000000007CB000-memory.dmp

    Filesize

    3.8MB

  • memory/2248-2-0x0000000000940000-0x0000000000948000-memory.dmp

    Filesize

    32KB

  • memory/2248-3-0x0000000002510000-0x0000000002511000-memory.dmp

    Filesize

    4KB

  • memory/2248-4-0x0000000000400000-0x00000000007CB000-memory.dmp

    Filesize

    3.8MB

  • memory/2248-6-0x0000000002510000-0x0000000002511000-memory.dmp

    Filesize

    4KB