Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 20:12
Behavioral task
behavioral1
Sample
3a8abf9d63a69e2bc522eb3eab8fc942.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a8abf9d63a69e2bc522eb3eab8fc942.exe
Resource
win10v2004-20231215-en
General
-
Target
3a8abf9d63a69e2bc522eb3eab8fc942.exe
-
Size
359KB
-
MD5
3a8abf9d63a69e2bc522eb3eab8fc942
-
SHA1
5485bafc5bfffa546fc86be1868a5e7a621e5c86
-
SHA256
e9eb7cb88aca7efbd28639bb2913f7530a3e3ce16e388af423b5c76faa7aff9a
-
SHA512
ce47b85045e099cbe9bd7abed97132fc3ee9cc16c7228adb2094e5eeaa80d446902e52cc696f8b8f6b647231f0a3d651f1d0fed76b6af5b5461c00e6be0cfe7a
-
SSDEEP
6144:ZgRyiIWQFpUv4/B+FrM144XlzKlUAzYYbuewX79GtPuB8PxwPh79i5s/CoS9iP6g:3iMCv45+uK4VKXknewr9GBY85wPTi5sv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/816-0-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral2/memory/816-16-0x0000000000400000-0x000000000050D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 816 3a8abf9d63a69e2bc522eb3eab8fc942.exe 816 3a8abf9d63a69e2bc522eb3eab8fc942.exe 816 3a8abf9d63a69e2bc522eb3eab8fc942.exe 816 3a8abf9d63a69e2bc522eb3eab8fc942.exe 816 3a8abf9d63a69e2bc522eb3eab8fc942.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799B
MD50a3e26f192f27a66b704f09e4590a4c9
SHA16adec0de233d645907c8d14f481aa005ce8bee3a
SHA2563a8c54a784836a10ba38b1aeac420f43cadc9120d0b7fe621e69e8465575199b
SHA512e858e2481280ed4c880a0077de0b9ba7cd9de4421fb4a9d3b954030efa267a4fc6b8a69c34ff82bdeb327690029aca274bd87681f16e83af96b8a225886a3dca
-
Filesize
635B
MD533f09577707d079a40f706a18e126d92
SHA10cef1f55b72a84e584a51e79a6787ea78d74a603
SHA256e7f6bd122fcb829793f4047a5b929668b0a91ebfe31247b479586ec6d8f2b378
SHA5125538c5b4e538a97796bfc412b3a81449931a9bbc1fa4e69500a0b30b35c1259bda857f392d85d87893999098bc88a432f28d2f699fadc295709a75b8113933cb