Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 23:04

General

  • Target

    17efad46fcba794cc601261173d5e383.exe

  • Size

    13KB

  • MD5

    17efad46fcba794cc601261173d5e383

  • SHA1

    da4971eeefe4c61e46509415c4a95e928406ff3f

  • SHA256

    bdf33241f7f11834043728b48f14a1f15140643cbbf2ec864b28b462c4879ddb

  • SHA512

    315ec2fa84b26e47777093c5a3446840fe07c70a184530a7dadbfd9e4ad11ee9ad85e58f27e8bc0785d42446c27017a4838721fd1c7cb1f80347549038e48909

  • SSDEEP

    192:3NN+yXpaD33JyFe3MLAZSIiTwl+oJwxnNCc9+Uz:3NN+yXpaD3Zue3Ms9vc9+C

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17efad46fcba794cc601261173d5e383.exe
    "C:\Users\Admin\AppData\Local\Temp\17efad46fcba794cc601261173d5e383.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads