Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 18:18

General

  • Target

    33f3508c92144d839a32cc40eb8db579.exe

  • Size

    594KB

  • MD5

    33f3508c92144d839a32cc40eb8db579

  • SHA1

    4eee8a9eafff01aace51331fe2d6452e1dea12c9

  • SHA256

    7e1b514bd2cf144244b3bc3cef1e03afd8db7391111cb04dfacb610cfb07aca0

  • SHA512

    75259a6c33c26082a9e2cb49d365489d8a02b5b692d6d99fd0558020ae4f4ef7eea84121fbbb2b6a4d3ca6e2533f3aa79359cf8e11e102e65e62f536f0629f04

  • SSDEEP

    12288:CbvCxDNIn4WhnhGkOWLPyuh3yH/VTS9EgZxogOkeNKlTjtEBpMz+8c6wvkn:GC1NI4iIpCyi0hKqgOkHRjbT

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33f3508c92144d839a32cc40eb8db579.exe
    "C:\Users\Admin\AppData\Local\Temp\33f3508c92144d839a32cc40eb8db579.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1960-0-0x0000000000400000-0x00000000008A9000-memory.dmp

    Filesize

    4.7MB

  • memory/1960-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1960-3-0x0000000000400000-0x00000000008A9000-memory.dmp

    Filesize

    4.7MB

  • memory/1960-4-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB