Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:12

General

  • Target

    8d0e266bf5c77d40654ca3492075182f482e22c0795312f013012899ec2da9ef.exe

  • Size

    6.3MB

  • MD5

    01758b3873005d7e4bd47a8a192e0712

  • SHA1

    8bb7607f452a43a250b45a65e41585e5b2fa45df

  • SHA256

    8d0e266bf5c77d40654ca3492075182f482e22c0795312f013012899ec2da9ef

  • SHA512

    34a0abb6f596547f73614861258c82e12ae081054fabc009f297f7c89dc94fe0965a714df2c239396970c13efb8e576d18dce0e238431b39c8b1a5c2bf97c4e6

  • SSDEEP

    98304:T+wjBvn+njCZW9u3M3WC5DzyIBZeXN4VFLOAkGkzdnEVomFHKnP:TzvnbnMGCtzZBcXN4VFLOyomFHKnP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d0e266bf5c77d40654ca3492075182f482e22c0795312f013012899ec2da9ef.exe
    "C:\Users\Admin\AppData\Local\Temp\8d0e266bf5c77d40654ca3492075182f482e22c0795312f013012899ec2da9ef.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2124

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Bg3.ini

          Filesize

          21B

          MD5

          224a0efd567a26f884e98244e106567c

          SHA1

          29580574a9a978b55e61646cf5b359937fec54d4

          SHA256

          0fa1603978cc2f47019e0fdc111fa71fc52150426febb7d498ea28cd22d9099b

          SHA512

          ba3e25a2f08faca51f4d17f3d1aa9dd0a2bcc3767acc698789c90891d6a761c39cd2429a059532b4c60e55ae2164b2634a4b35404dff01aca5bb253ef59fd9fc