Analysis

  • max time kernel
    164s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 23:44

General

  • Target

    44167ef5ffb6653ca65b6f5edf5635b7.exe

  • Size

    255KB

  • MD5

    44167ef5ffb6653ca65b6f5edf5635b7

  • SHA1

    ea43f80de697b260bcbab1b3e88a74ba47808e1f

  • SHA256

    121d2d265d49e7abd78dcdf5be6691851837387c35a493c4ccbc8bb6835bfe6b

  • SHA512

    cbb689c943f54d0654ba05a61b5c6c46ea5c8dec8ffa3484fa2f17839a02c18c57d1bde5dc53482d4f13520f32648af1107273cc48b4669b075df86e9a5b69d0

  • SSDEEP

    3072:9mw097ccr33Y4sQyRq3cHrom6Xmu1YatA1GR0hdtcjXo+5BDuXpzDenZ0WCd6aCC:o97F2E2olXmratgGet6XTBApGmf4aCbO

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44167ef5ffb6653ca65b6f5edf5635b7.exe
    "C:\Users\Admin\AppData\Local\Temp\44167ef5ffb6653ca65b6f5edf5635b7.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:4380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4380-1-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/4380-0-0x00000000004A0000-0x00000000004A1000-memory.dmp

    Filesize

    4KB

  • memory/4380-2-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/4380-3-0x00000000004D0000-0x00000000004D1000-memory.dmp

    Filesize

    4KB

  • memory/4380-4-0x00000000014C0000-0x00000000014E9000-memory.dmp

    Filesize

    164KB

  • memory/4380-5-0x0000000004130000-0x000000000415F000-memory.dmp

    Filesize

    188KB

  • memory/4380-9-0x00000000014C0000-0x00000000014E9000-memory.dmp

    Filesize

    164KB

  • memory/4380-12-0x0000000004580000-0x00000000045A7000-memory.dmp

    Filesize

    156KB

  • memory/4380-16-0x00000000014C0000-0x00000000014E9000-memory.dmp

    Filesize

    164KB

  • memory/4380-18-0x00000000014C0000-0x00000000014E9000-memory.dmp

    Filesize

    164KB