Analysis

  • max time kernel
    177s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 16:20

General

  • Target

    055db2d125d793463f18dad2a3fcb9bf.exe

  • Size

    1.7MB

  • MD5

    055db2d125d793463f18dad2a3fcb9bf

  • SHA1

    5f2b8758a18fe6aad0628506d3fcf685842f3589

  • SHA256

    f9be9db42fda449da644bf7a0124a622791a52a984f9aa9be0f9dad92f5ba12f

  • SHA512

    5300400a2bd24ceadef2b068c45a0cf1337c75d4de2e3322aa6db37dc03fe4e5c3c837e63a078092290e99a117c2a37ac1deab8af7a9b8c9d9bf7cb1c4aed153

  • SSDEEP

    24576:q3CR3PD+x7DPiCmJ9fIw7HlpaBafd9AH5acGcQhs5r+gUV68UyFal/IrdgCeskrx:u8LUqjA23aBajAH5NTBFjUHUfIr6CCd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\055db2d125d793463f18dad2a3fcb9bf.exe
    "C:\Users\Admin\AppData\Local\Temp\055db2d125d793463f18dad2a3fcb9bf.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2808-0-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-1-0x00000000008C0000-0x0000000000900000-memory.dmp

    Filesize

    256KB

  • memory/2808-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2808-3-0x00000000008C0000-0x0000000000900000-memory.dmp

    Filesize

    256KB

  • memory/2808-4-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-5-0x0000000002400000-0x0000000002510000-memory.dmp

    Filesize

    1.1MB

  • memory/2808-7-0x0000000002610000-0x0000000002790000-memory.dmp

    Filesize

    1.5MB

  • memory/2808-6-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-9-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-10-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-11-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-12-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-16-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2808-15-0x00000000020B0000-0x0000000002140000-memory.dmp

    Filesize

    576KB

  • memory/2808-17-0x0000000002790000-0x00000000033DA000-memory.dmp

    Filesize

    12.3MB

  • memory/2808-14-0x0000000002150000-0x00000000021F0000-memory.dmp

    Filesize

    640KB

  • memory/2808-13-0x0000000002510000-0x0000000002610000-memory.dmp

    Filesize

    1024KB

  • memory/2808-18-0x0000000000400000-0x00000000008BD000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-19-0x00000000008C0000-0x0000000000900000-memory.dmp

    Filesize

    256KB

  • memory/2808-21-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB