Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:15

General

  • Target

    055db2d125d793463f18dad2a3fcb9bf.exe

  • Size

    1.7MB

  • MD5

    055db2d125d793463f18dad2a3fcb9bf

  • SHA1

    5f2b8758a18fe6aad0628506d3fcf685842f3589

  • SHA256

    f9be9db42fda449da644bf7a0124a622791a52a984f9aa9be0f9dad92f5ba12f

  • SHA512

    5300400a2bd24ceadef2b068c45a0cf1337c75d4de2e3322aa6db37dc03fe4e5c3c837e63a078092290e99a117c2a37ac1deab8af7a9b8c9d9bf7cb1c4aed153

  • SSDEEP

    24576:q3CR3PD+x7DPiCmJ9fIw7HlpaBafd9AH5acGcQhs5r+gUV68UyFal/IrdgCeskrx:u8LUqjA23aBajAH5NTBFjUHUfIr6CCd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\055db2d125d793463f18dad2a3fcb9bf.exe
    "C:\Users\Admin\AppData\Local\Temp\055db2d125d793463f18dad2a3fcb9bf.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2608-2-0x0000000000220000-0x0000000000260000-memory.dmp

          Filesize

          256KB

        • memory/2608-1-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2608-0-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-3-0x0000000000220000-0x0000000000260000-memory.dmp

          Filesize

          256KB

        • memory/2608-5-0x00000000024A0000-0x00000000025B0000-memory.dmp

          Filesize

          1.1MB

        • memory/2608-4-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-6-0x00000000026B0000-0x0000000002830000-memory.dmp

          Filesize

          1.5MB

        • memory/2608-7-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-9-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-11-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-10-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-12-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-13-0x00000000025B0000-0x00000000026B0000-memory.dmp

          Filesize

          1024KB

        • memory/2608-14-0x0000000002220000-0x00000000022C0000-memory.dmp

          Filesize

          640KB

        • memory/2608-16-0x00000000002D0000-0x00000000002D1000-memory.dmp

          Filesize

          4KB

        • memory/2608-15-0x0000000000360000-0x00000000003F0000-memory.dmp

          Filesize

          576KB

        • memory/2608-17-0x0000000002830000-0x000000000347A000-memory.dmp

          Filesize

          12.3MB

        • memory/2608-18-0x0000000000400000-0x00000000008BD000-memory.dmp

          Filesize

          4.7MB

        • memory/2608-20-0x0000000000220000-0x0000000000260000-memory.dmp

          Filesize

          256KB

        • memory/2608-22-0x00000000002D0000-0x00000000002D1000-memory.dmp

          Filesize

          4KB