Analysis
-
max time kernel
0s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
1063da0d257d406e7e74bde623872363.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1063da0d257d406e7e74bde623872363.exe
Resource
win10v2004-20231215-en
General
-
Target
1063da0d257d406e7e74bde623872363.exe
-
Size
93KB
-
MD5
1063da0d257d406e7e74bde623872363
-
SHA1
db6ab7043b0655d54118f135b4e996b1dd61b7aa
-
SHA256
5d26ad82cab996504ecf6053be95c8df1363d02a2552b688f531e20814356969
-
SHA512
7660032801c4be7260d0bff14f69da494e7e888a3e49dd511758f8756c945b0afbcd289a63cf7fc4092c66c7e27a048213e2df7f2871258ae7aef5500b91db3b
-
SSDEEP
1536:NyQT05QG70AQz6CwvonnZfr0od8yQoAX2D357dGweFrBNo8DirUrlFIy:HZD0o3A2lZirztrlFIy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\1063da0d257d406e7e74bde623872363.exe"C:\Users\Admin\AppData\Local\Temp\1063da0d257d406e7e74bde623872363.exe"1⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Gnv..bat" > nul 2> nul2⤵PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5a91f3b796f747dfb0e67c05640c39250
SHA108093e54023e78cbb7d790c10ae45a8fb02ef964
SHA2560fd5e903098274c7313e925853d301169cbaca8253e5ca8af08f9b17224e996e
SHA51204dcce6caf4d15240a25a015d00f6423d0440db2936b5addc5e9dfe0fb80fc73b53ed5b5e9292061d3513d55ea243de645a75eac55379321ac03de3397e30139