Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 19:38

General

  • Target

    38949dbb51fd253064b71e3f807037f0.exe

  • Size

    43KB

  • MD5

    38949dbb51fd253064b71e3f807037f0

  • SHA1

    6754f8590a4d97c1dff9191f1bf60fcdd7668501

  • SHA256

    727cffbf4d4629b5e22d47eb0a92d58f5e6b05f125054d5a90510dc112620182

  • SHA512

    329d14ea09f42888bba82e94dc8368643da9fd393c785260efa3150de999035041625cd6076b83c3b647c32e0e2f6e9ca240a7ea82a0136dff5a578d1708d647

  • SSDEEP

    768:xmtAMffRaY+2dIyY1shp/zWTRtpMcAlH6levwGokq4JV/rlXb:xmtAO42denYcAUl2okLT/pL

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38949dbb51fd253064b71e3f807037f0.exe
    "C:\Users\Admin\AppData\Local\Temp\38949dbb51fd253064b71e3f807037f0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    PID:2900

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2900-4-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2900-2-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2900-1-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2900-0-0x0000000000220000-0x0000000000225000-memory.dmp

          Filesize

          20KB