Analysis

  • max time kernel
    172s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 14:02

General

  • Target

    23fc115d20ed6b9263afc53c73030d71.exe

  • Size

    777KB

  • MD5

    23fc115d20ed6b9263afc53c73030d71

  • SHA1

    3d5eb02a2f99e0cc2838525944b61aca8824e542

  • SHA256

    11ebc6a2e6e193bf070d3fbaba70fa498920db08a7b18451d9ac43eb0001cce1

  • SHA512

    835e2b192e0a425077234fbdde4c9b13ff00378184754da9767d3accb178fc2663d4c79285daaa7856befd5c80ab983434dbc319a56dc61defa4a06653dc48f3

  • SSDEEP

    12288:igdnyuNx+GdTUx31iQ6QupiNq5D+rGKOo67Wsr047JSMQEBGNh1m3qe6:FHTq31j6DpiE5iKKOr700JS9jb1uqL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23fc115d20ed6b9263afc53c73030d71.exe
    "C:\Users\Admin\AppData\Local\Temp\23fc115d20ed6b9263afc53c73030d71.exe"
    1⤵
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\23fc115d20ed6b9263afc53c73030d71.exe:typelib

    Filesize

    8KB

    MD5

    b67c1b008ea3ac9ec924fa9c53b99046

    SHA1

    c4c1b0253c17b85b8db073e99663e779edd8ee9b

    SHA256

    0be83cadc34db187cfda1212f77e9c88592a6fc2da644cb92938e792b08cfda3

    SHA512

    ca511501ab31892c33b0516b74b629f4d567721a417d5ae6a71922dc0331f1acbd381f2d5daef7f02767e6c62a818ffe16c4b985e53ea392c86e25185ed779ff

  • memory/2296-0-0x0000000000330000-0x00000000004E3000-memory.dmp

    Filesize

    1.7MB

  • memory/2296-7-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/2296-14-0x0000000000330000-0x00000000004E3000-memory.dmp

    Filesize

    1.7MB