Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2023 06:40

General

  • Target

    15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe

  • Size

    1.6MB

  • MD5

    f4285ddd8f78ffeefe2acafcd3197d50

  • SHA1

    78c31bc506710b3cd57d5f942514be357418fff5

  • SHA256

    15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4

  • SHA512

    60ea68fcf3075ae8d78539d8440a414d002e581bb2449db6ae41e9ba54bc48f13451dbf735dce4fa9cd95a495b8b25af564514099c831f081bce4c0ebb423eab

  • SSDEEP

    49152:+Lvp0f/7eZuFvjT++LG9rSTCqYUUfUvXolNWQQLYp:Svs/7e0FvjT++LGdiCqYUfvokQQU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe
    "C:\Users\Admin\AppData\Local\Temp\15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2800-0-0x0000000000400000-0x00000000005D9000-memory.dmp

    Filesize

    1.8MB

  • memory/2800-2-0x0000000001EC0000-0x0000000001ED0000-memory.dmp

    Filesize

    64KB

  • memory/2800-3-0x0000000000400000-0x00000000005D9000-memory.dmp

    Filesize

    1.8MB

  • memory/2800-4-0x0000000001EC0000-0x0000000001ED0000-memory.dmp

    Filesize

    64KB