Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 02:50

General

  • Target

    4def8901afaeae20a52fcf20385def3e.exe

  • Size

    47KB

  • MD5

    4def8901afaeae20a52fcf20385def3e

  • SHA1

    586f02398f21f2e8e67dff2488346559e411287e

  • SHA256

    eca5bc46197d1d0e11a8c4c1161c81598eaa658ef184e5b2150ded35cb31a61a

  • SHA512

    d33c8d94f1aaefb3ad546abff9f3fab3efa2cd993c27718ade3c62ab56c6c0d8eaae0ee1d4f2a9ed16bbe91c49fb054519e1b3f4dcdd0383e3c0728d2293c690

  • SSDEEP

    384:0evO3CYHuPPw7L49ROCT3QPQmmQ63OQ/Wt+b5sOpZmUbyFiVov8TRrkODH0s2BlW:0uOSHw/4hXZmji08zBe6/+7XTTw

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4def8901afaeae20a52fcf20385def3e.exe
    "C:\Users\Admin\AppData\Local\Temp\4def8901afaeae20a52fcf20385def3e.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\1.lnk

    Filesize

    1KB

    MD5

    be94297de53f8d4a7b58348d2ca248ce

    SHA1

    e7e01d94ec8bc1238978a4e83ab4787574b62abf

    SHA256

    9560633b5668b699ec0234dbae10aa5746ac50cb953a36a131dade45a4bcfccc

    SHA512

    d25a48e10c8fb43b897e25f7db4e37c3340986d18df10bad1cf0b558650eb22cadc5a4a354efe623315a08cfce2ddb20c02ba95f2c2d49f4bdf354d195a01721