Analysis

  • max time kernel
    111s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 01:09

General

  • Target

    481e464fecd9f2369bc20bd486eaf4a0.exe

  • Size

    117KB

  • MD5

    481e464fecd9f2369bc20bd486eaf4a0

  • SHA1

    b7fdac92b826799326bead100b39694697fe2536

  • SHA256

    ddbc9adb658b2d8ed8161f66f0bd2712ce920bd45c1977ff742a9ca19a082e8a

  • SHA512

    5b334bb5b8df397b409714f767c149d3933795f23565d4d5bebc7dfb79e90efc52d8ae956892e4f0f693efe960b4f868b65f66196bef4eb10204b291175ec823

  • SSDEEP

    1536:UeuEarAQ6xRoM9A65gBDg5LN+SpEFqhcEXD2wEm140O3aETVBO52+S+DEBBBBBBB:huEarAXoRN6IcfCEXD2wEm1STV85v

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\481e464fecd9f2369bc20bd486eaf4a0.exe
    "C:\Users\Admin\AppData\Local\Temp\481e464fecd9f2369bc20bd486eaf4a0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Enumerates connected drives
    • Modifies WinLogon
    • Suspicious use of FindShellTrayWindow
    PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3472-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB