Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 11:42

General

  • Target

    1ba8c1837e353c7dcf24c884f7a0e87c.exe

  • Size

    220KB

  • MD5

    1ba8c1837e353c7dcf24c884f7a0e87c

  • SHA1

    294ae14ba460d60b92fa080c7d014b6e492fb2e4

  • SHA256

    067200d8b321eed04475c8c85ec8697b3e5ea98f2bc2b655ccadaddcb80554df

  • SHA512

    7bb6b70d1f763474062f1da8b062d9ec9df00f57366688ade670cb3bf37f87bf51309f71f0ee500a7bb00221254425e52deaf67fbeb16ad23f3411b18f9f69bb

  • SSDEEP

    6144:al6nsVRHLTjVJ71VgjP+xsrdG7iB59LgcK:aSIRHTV/VgLMnaHLgcK

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ba8c1837e353c7dcf24c884f7a0e87c.exe
    "C:\Users\Admin\AppData\Local\Temp\1ba8c1837e353c7dcf24c884f7a0e87c.exe"
    1⤵
    • Drops file in Windows directory
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2168-5-0x0000000000970000-0x000000000099F000-memory.dmp

    Filesize

    188KB

  • memory/2168-9-0x00000000000A0000-0x00000000000C0000-memory.dmp

    Filesize

    128KB

  • memory/2168-4-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2168-3-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2168-2-0x00000000000A0000-0x00000000000C0000-memory.dmp

    Filesize

    128KB

  • memory/2168-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2168-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2168-16-0x00000000000A0000-0x00000000000C0000-memory.dmp

    Filesize

    128KB