Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
00d3271c81d87f0111fadd455ae428a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00d3271c81d87f0111fadd455ae428a5.exe
Resource
win10v2004-20231215-en
General
-
Target
00d3271c81d87f0111fadd455ae428a5.exe
-
Size
29KB
-
MD5
00d3271c81d87f0111fadd455ae428a5
-
SHA1
44a0c267778d7530b5553ad0af29ee5c5da5894d
-
SHA256
d3ae20cfce0beaa99e7e025e636ffdf1edb803adce99a3778625e89f965456fa
-
SHA512
a8a8660ad1110345ed125a331ed2e45fc7bdd1d2b5e6cb13a6dae70832acfa6a6bdb9cb1149b8c1167e84c32ba5ffa36b963fb747c14bf4e53213ccfcb7461e8
-
SSDEEP
768:oGU21skdbiRnclSOKsmFVSFyT84ZOAWr6x0S8lr:oGvbiRncl3KS940FJSy
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Update 00d3271c81d87f0111fadd455ae428a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58bfcf44eb468bd8d016c0a378f5ce3b6
SHA111afc64a4248bf6856fc4f8481d6b62f50f86143
SHA25604aa3b55acb1d205869dda64310cd684169666980c1fc4f41d7364ee58a7f973
SHA5123e445d11ba096b13fca27dd4a7cd620eff4a31f90163f91002128baf96ad95bf58f4dd7143ca59789701aacc55fd9d68400e6bff350e1781696cdf0a95754ea8