Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 03:22
Behavioral task
behavioral1
Sample
02b72f46ffbefe3f47b62cdd7a7c5bdf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02b72f46ffbefe3f47b62cdd7a7c5bdf.exe
Resource
win10v2004-20231215-en
General
-
Target
02b72f46ffbefe3f47b62cdd7a7c5bdf.exe
-
Size
15KB
-
MD5
02b72f46ffbefe3f47b62cdd7a7c5bdf
-
SHA1
3daefad01bdcecd37ea32a0c3396c655cb8e5dad
-
SHA256
23a4443a2cc8df68b4b90f5581aff7d4750b1db2aa5dd1822bf31c9243567905
-
SHA512
ab22f740a2b6e810d4083450069a02a7bc1fa540ad93642fca6aac64c7aafd2b4a1d7266095676a3f5171c12b2ce0b70b099d1dd8e62ab5ccab878e7fe2fa2d6
-
SSDEEP
384:xTuJF0BeRm5HdGdrfB+ylNHQbR9uyWcisZsWQwF:xTu/0B5dGpfXP6R9uBR3c
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1984-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1984-13-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1984 02b72f46ffbefe3f47b62cdd7a7c5bdf.exe 1984 02b72f46ffbefe3f47b62cdd7a7c5bdf.exe 1984 02b72f46ffbefe3f47b62cdd7a7c5bdf.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5073130cc29be4ab7d11bf555549e07a0
SHA1993f60d81d78fc4c5887f90cace5d961638f1860
SHA256ec98b901106dab27d9486dedef505fcd99278864df76f83a4b4294c0637a9417
SHA5127156d273c764e9490774491f575d3bb6d6e5e4cef3cb77bf7837508c831e9f7d6afa51dd9ab672d2c0c088a363822fa8815d7aa8352dbfe7d7dbd34fbcedb2f0