Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 08:27

General

  • Target

    11f62e4bf1eb6372199a94f83257fbfd.exe

  • Size

    317KB

  • MD5

    11f62e4bf1eb6372199a94f83257fbfd

  • SHA1

    2113b5fd7978bccd3bf51d23b4e78028464ed713

  • SHA256

    11d47dd3e1320a29989e03652b5e03b77fb9efd9e80c4e5830718d5e23a9211f

  • SHA512

    15f670d4175ce232c4530c752a6fdc685839f380606c06a695334baf1cce13914d46449c6437c8407fec4e843412894fcb6e93b75805e82c5e93fe45bf0afe95

  • SSDEEP

    6144:gW/SMXXoeTmQxWOoAJeGiTSvfEkA2W14G:5/hIeaQxWOtUGYSvf5c14G

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11f62e4bf1eb6372199a94f83257fbfd.exe
    "C:\Users\Admin\AppData\Local\Temp\11f62e4bf1eb6372199a94f83257fbfd.exe"
    1⤵
    • Drops file in Windows directory
    PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3056-4-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/3056-9-0x00000000000A0000-0x00000000000C0000-memory.dmp

    Filesize

    128KB

  • memory/3056-5-0x0000000000160000-0x000000000018F000-memory.dmp

    Filesize

    188KB

  • memory/3056-3-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/3056-2-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/3056-17-0x00000000000A0000-0x00000000000C0000-memory.dmp

    Filesize

    128KB

  • memory/3056-1-0x00000000000A0000-0x00000000000C0000-memory.dmp

    Filesize

    128KB

  • memory/3056-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB