Analysis

  • max time kernel
    24s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 11:47

General

  • Target

    1bdefd0114b515185c51daf4caba1604.exe

  • Size

    55KB

  • MD5

    1bdefd0114b515185c51daf4caba1604

  • SHA1

    50fa091423265c9f35c42542b50b2aa78a313669

  • SHA256

    5c8ce9fb74edfb0cae4e05db7563f38c32ad0c3bbbbed58a7914940915bde164

  • SHA512

    51114cdafbdf4918b52dc2099cbf5c9ce3bd0762bb390a24aac918b52a299bffdc88baa4ae1ec44e1abe41de3d012efea3db210a4743519cb78696cc9e4a0b18

  • SSDEEP

    1536:NQ56/eLLlTV/mGLfK+P/Rrh0anLF4vqUtrq+CbVj/kI7voN3VVNFcRbsENDYEQ24:NsDdK4VJ5q0G

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bdefd0114b515185c51daf4caba1604.exe
    "C:\Users\Admin\AppData\Local\Temp\1bdefd0114b515185c51daf4caba1604.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ufr_reports\NO_PWDS_report_26-12-2023_03-03-35-707D6FA9-MFLH.bin

    Filesize

    1KB

    MD5

    67e52384c4ad22eeb9aaf9a7d62832b6

    SHA1

    ec7ba502d8cdfe53b335cdfcc5058a9f084ae42d

    SHA256

    4a2dc44b6a85b09564fd67156ad1378227a24b5ead56bfd42a0f33b86cc0e464

    SHA512

    46d1ccfa63b810c9d8e6873b47a25037541e4fc4e2f586deecdec388373fa7ce74a76a710b8091291674540db1a4cf73a658e5e95d4fdbc399e518452e116539

  • memory/2764-0-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2764-9-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB