Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 20:13

General

  • Target

    3a8e57d01c4151241a18034fbb0d494a.exe

  • Size

    253KB

  • MD5

    3a8e57d01c4151241a18034fbb0d494a

  • SHA1

    ee67cde80139774342e902544b5d2e97ea893af1

  • SHA256

    204e9c2a5c68e9f62758edea89bc240b5ee44b86b000831ec9ba05c54e06e8b7

  • SHA512

    50a9d786d061d89142cd1502cf9b1abf391373118c7a212ca23eefc566ad1124a091d2e4fb1f035ef9c6e0e5c8e270908087e2b16b0a2468d697161dc1c21ce2

  • SSDEEP

    6144:4BYQ53mDw1VO18yH5cVQmM2ap/eK5Zz18WeO:4/mGnre//5T8WeO

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a8e57d01c4151241a18034fbb0d494a.exe
    "C:\Users\Admin\AppData\Local\Temp\3a8e57d01c4151241a18034fbb0d494a.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:4636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4636-0-0x0000000000C00000-0x0000000000C01000-memory.dmp

          Filesize

          4KB

        • memory/4636-1-0x0000000000C10000-0x0000000000C11000-memory.dmp

          Filesize

          4KB

        • memory/4636-2-0x0000000000C20000-0x0000000000C21000-memory.dmp

          Filesize

          4KB

        • memory/4636-3-0x0000000000C40000-0x0000000000C41000-memory.dmp

          Filesize

          4KB

        • memory/4636-4-0x0000000000C50000-0x0000000000C79000-memory.dmp

          Filesize

          164KB

        • memory/4636-5-0x00000000014B0000-0x00000000014DF000-memory.dmp

          Filesize

          188KB

        • memory/4636-9-0x0000000000C50000-0x0000000000C79000-memory.dmp

          Filesize

          164KB

        • memory/4636-12-0x0000000004D80000-0x0000000004DA7000-memory.dmp

          Filesize

          156KB

        • memory/4636-16-0x0000000000C50000-0x0000000000C79000-memory.dmp

          Filesize

          164KB

        • memory/4636-20-0x0000000000C50000-0x0000000000C79000-memory.dmp

          Filesize

          164KB

        • memory/4636-25-0x0000000000C50000-0x0000000000C79000-memory.dmp

          Filesize

          164KB