Analysis

  • max time kernel
    132s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 16:42

General

  • Target

    065474184c0878ec8ab69a692e8a3cbe.exe

  • Size

    229KB

  • MD5

    065474184c0878ec8ab69a692e8a3cbe

  • SHA1

    f2fdf266f1bffbfd78f331e188fce0e27dfe9afb

  • SHA256

    a8b354c22f87f2c3ce2fb30e3ef4ef11b9df2df7fe8f88bac9de9dde5e409e5a

  • SHA512

    5fc26c4938e90ee28cdea0fb8b1e9425f8b3b9de3f97f46dd13edbe371d5388eabc2e40b707f6085073183b6fa279ee633af4d484949e07312b030a4c048e71a

  • SSDEEP

    3072:jJKvhBDtseI5QLttWnHEmvZkEMU5Xujlqggqhlp0FiWcqYWZ7vVlDa:jJi1CQLXuF1MRjlqggSwFi0Rtl2

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\065474184c0878ec8ab69a692e8a3cbe.exe
    "C:\Users\Admin\AppData\Local\Temp\065474184c0878ec8ab69a692e8a3cbe.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2396-0-0x0000000001C00000-0x0000000001D00000-memory.dmp

    Filesize

    1024KB

  • memory/2396-2-0x0000000001B70000-0x0000000001B9F000-memory.dmp

    Filesize

    188KB

  • memory/2396-9-0x0000000002650000-0x0000000002677000-memory.dmp

    Filesize

    156KB