Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 00:15

General

  • Target

    1c366e62aa1774b430a2ea85be107748.exe

  • Size

    257KB

  • MD5

    1c366e62aa1774b430a2ea85be107748

  • SHA1

    7c5b0b5464d1b4ada915c6b283e2346985d53864

  • SHA256

    16db04c0f6bc7967a4937a39454ec30d8c67fac0f0d66ba90db506dd04cdf4c0

  • SHA512

    48dbaff8d45ac61254ec36b2555b77ec77de3bf2c3e8ff7b242860906de180c4ea62b2dba559f5893b93e603a75044d7af00daed2c11f7f46e17bd2be95329f3

  • SSDEEP

    6144:OXRvLSbrvyS28ZYL95g1IdcUgiQ6tvy+EksTN:OXRTSbF1YLTgOZLlRlsTN

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c366e62aa1774b430a2ea85be107748.exe
    "C:\Users\Admin\AppData\Local\Temp\1c366e62aa1774b430a2ea85be107748.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1844-0-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1844-1-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1844-2-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/1844-3-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/1844-4-0x0000000000330000-0x0000000000359000-memory.dmp

    Filesize

    164KB

  • memory/1844-5-0x00000000006D0000-0x00000000006FF000-memory.dmp

    Filesize

    188KB

  • memory/1844-9-0x0000000000330000-0x0000000000359000-memory.dmp

    Filesize

    164KB

  • memory/1844-12-0x0000000000BF0000-0x0000000000C17000-memory.dmp

    Filesize

    156KB

  • memory/1844-16-0x0000000000330000-0x0000000000359000-memory.dmp

    Filesize

    164KB

  • memory/1844-17-0x0000000000330000-0x0000000000359000-memory.dmp

    Filesize

    164KB

  • memory/1844-25-0x0000000000330000-0x0000000000359000-memory.dmp

    Filesize

    164KB