Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2023 12:07

General

  • Target

    d610608364afbb4dcfd94365f718c65d.exe

  • Size

    420KB

  • MD5

    d610608364afbb4dcfd94365f718c65d

  • SHA1

    a19856f233e0ce641550b4470ea8e32e7ddeaba5

  • SHA256

    05815418cfc42049037a3aee0cab64353d01bb2003b88faf7a89258b40d6b3b9

  • SHA512

    048769f7f23a85820dca60fa514be1a6cd537eb8fae1735c782af3c87982144ae2a8918e80e8488114156c180818a9d896b038a3cd3bac82fe0efb3289b7b20e

  • SSDEEP

    6144:rbyAijbEY1ZOCGY8hvMC50Os9bvAtYVOt+UFIo1npo8W18Uex9fq:reAUFElUA0Os97OApYQiUSfq

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe
    "C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-1-0x00000000001A0000-0x00000000001A4000-memory.dmp

    Filesize

    16KB

  • memory/3044-2-0x00000000000F0000-0x00000000000F5000-memory.dmp

    Filesize

    20KB

  • memory/3044-0-0x00000000000D0000-0x00000000000D7000-memory.dmp

    Filesize

    28KB

  • memory/3044-6-0x000000013F270000-0x000000013F312000-memory.dmp

    Filesize

    648KB

  • memory/3044-4-0x00000000001A0000-0x00000000001A4000-memory.dmp

    Filesize

    16KB

  • memory/3044-11-0x00000000000F0000-0x00000000000F5000-memory.dmp

    Filesize

    20KB