Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 05:00

General

  • Target

    5639ea64e25a2826bafbdd1fca0c3bc2.exe

  • Size

    207KB

  • MD5

    5639ea64e25a2826bafbdd1fca0c3bc2

  • SHA1

    06ed2a8b158b4439aa72111a33d6201274bb51ed

  • SHA256

    0471a4eb97126577a43b419139bad9eab23c7d84fa1011d093119ac705af8092

  • SHA512

    9450421776452113f83eece75dae0433de044fa19c7b8719359f68a570b5a0b3b13a4d424ba9f6b91c540c27a90d182dcd3977f587e6737040412b3a6dc3cd1b

  • SSDEEP

    6144:PT89PCRafny3Ox3YEcEQQNrE0gjkc+TWOJp:PT4PLPye3YqGIiqp

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5639ea64e25a2826bafbdd1fca0c3bc2.exe
    "C:\Users\Admin\AppData\Local\Temp\5639ea64e25a2826bafbdd1fca0c3bc2.exe"
    1⤵
    • Drops file in Windows directory
    PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-4-0x0000000000110000-0x000000000013F000-memory.dmp

    Filesize

    188KB

  • memory/1068-3-0x0000000001410000-0x0000000001450000-memory.dmp

    Filesize

    256KB

  • memory/1068-1-0x00000000009B0000-0x00000000009F0000-memory.dmp

    Filesize

    256KB

  • memory/1068-0-0x00000000007E0000-0x0000000000820000-memory.dmp

    Filesize

    256KB