Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
34e3d80893618ba4e68f081c4b4fd46e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
34e3d80893618ba4e68f081c4b4fd46e.exe
Resource
win10v2004-20231215-en
General
-
Target
34e3d80893618ba4e68f081c4b4fd46e.exe
-
Size
313KB
-
MD5
34e3d80893618ba4e68f081c4b4fd46e
-
SHA1
232f06dcb6142260febf5a6efcbd7f01f5a2acac
-
SHA256
2276a964aea8abc6033b763d7546291a5ff48f30df01cd57b1a8b2c0dbbdd6a3
-
SHA512
b46da3f58e034f224ed002fa87ee822e2f0b2c9ef771ec117ca2486979ce4e3c0aa59a30cb792150f7a5f4117d7c340bafed3412fd088dd3dcf0b215f2e2a0f7
-
SSDEEP
6144:/rb9uEo2S1YnQmCX492DkwNP3qpYFl2YyPuFITzyccux7rnrOzprCoM8:/rRu6/eIo4t3PuFITKUAn
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1436 34e3d80893618ba4e68f081c4b4fd46e.exe 1436 34e3d80893618ba4e68f081c4b4fd46e.exe 1436 34e3d80893618ba4e68f081c4b4fd46e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 34e3d80893618ba4e68f081c4b4fd46e.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 34e3d80893618ba4e68f081c4b4fd46e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1436 34e3d80893618ba4e68f081c4b4fd46e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1436 34e3d80893618ba4e68f081c4b4fd46e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34e3d80893618ba4e68f081c4b4fd46e.exe"C:\Users\Admin\AppData\Local\Temp\34e3d80893618ba4e68f081c4b4fd46e.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD5af7ce801c8471c5cd19b366333c153c4
SHA14267749d020a362edbd25434ad65f98b073581f1
SHA256cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA51288655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c
-
Filesize
54KB
MD58ce25717d5827206baaee8d28b13ccfa
SHA1987cf87e2e573413805fae457de2f35268f301f8
SHA256d23cc1960f9d9b17d603f0e295ca6ad51ce12fc97e7caa4660d16fe9a2f02d1a
SHA5126764dc1b8cadd8fb21df988cd028aa7f5313f2a8f7bbfb3833d5864232e8551434519cc1b26741f7f735237934f1830a75d4f1ead9a74334587c5e30fa015ec6
-
Filesize
59KB
MD5b553accf72b5e17e3cff98b2d4da3132
SHA1c3254cb4c6a2484a87c391084b6358f11ceb8094
SHA256e100d28aa66153cbf6d5faec5bcbd1b9e5f6717e5f9f96b5c9c0efe45ce02751
SHA5121f228423efa4937e03c0243dc9f7a9b97afeef85d74c0105c140ca60013e7c2ba88ad0cfc5045eedeadc3631c7317185fde30c86d84189fe350da1880bf904c0