Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 09:42

General

  • Target

    14e0eb6da4532f18bed47193f9f56df8.exe

  • Size

    462KB

  • MD5

    14e0eb6da4532f18bed47193f9f56df8

  • SHA1

    cba6b20a30d479a37d0e7aec2b7a91ec34a207bb

  • SHA256

    f0201b4a47759a9daf81741083887789cb07b4a74d32e0c15480829302ae5342

  • SHA512

    c149fba2d66ecb7e07d3cced30230d52c660c9d0bddabccc2d82609bdaf76eab528f9aa484e999872fdfbc34c0dd4fbf4d7bf94ec676a1fe80d71d08aac5b2f7

  • SSDEEP

    6144:+FNMnLC10WZ5awiTgYG/vVQ6woNTaauKg5RazhZzGBbcAOw/PKy7k:cNMnLc0WZ7sgJvVooNTakwIzhZzRy/Pg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14e0eb6da4532f18bed47193f9f56df8.exe
    "C:\Users\Admin\AppData\Local\Temp\14e0eb6da4532f18bed47193f9f56df8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads