Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 05:39

General

  • Target

    1035201185fc2bbb5a0a3fc895d117e9.exe

  • Size

    574KB

  • MD5

    1035201185fc2bbb5a0a3fc895d117e9

  • SHA1

    d41aa0276f660635fccce0a1797bf657794047e5

  • SHA256

    114d8f3cd53f5880815b4a74823b15713fb039a2edd85b72b18bd69eebabaa3f

  • SHA512

    73e86de91daa261b89fb246c04a28345392e4eabe122a305003d8f8819ca96962255ca0a80ccb521d8a79576be4fde13802c055071cc4e1c4e5ae7edc5e95273

  • SSDEEP

    12288:lnkICyBgaIAc76v51oObXq9IT+GBkZr23Pp/ubX0k6XUnJk4XKg0azZC2U9:5kIqa3c7ookq9IjkZKp/a0k6X6Jk4Xjs

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\1035201185fc2bbb5a0a3fc895d117e9.exe
    "C:\Users\Admin\AppData\Local\Temp\1035201185fc2bbb5a0a3fc895d117e9.exe"
    1⤵
    • Drops startup file
    PID:4032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4032-0-0x00000000016C0000-0x00000000016C1000-memory.dmp

    Filesize

    4KB

  • memory/4032-1-0x00000000016D0000-0x00000000016D2000-memory.dmp

    Filesize

    8KB

  • memory/4032-2-0x00000000016E0000-0x00000000016E1000-memory.dmp

    Filesize

    4KB

  • memory/4032-3-0x00000000017B0000-0x00000000017B1000-memory.dmp

    Filesize

    4KB

  • memory/4032-4-0x00000000017D0000-0x00000000017D1000-memory.dmp

    Filesize

    4KB

  • memory/4032-5-0x00000000017E0000-0x00000000017E1000-memory.dmp

    Filesize

    4KB

  • memory/4032-7-0x00000000021B0000-0x00000000021DC000-memory.dmp

    Filesize

    176KB

  • memory/4032-8-0x0000000001800000-0x0000000001801000-memory.dmp

    Filesize

    4KB

  • memory/4032-10-0x0000000001860000-0x0000000001861000-memory.dmp

    Filesize

    4KB

  • memory/4032-12-0x0000000001870000-0x0000000001871000-memory.dmp

    Filesize

    4KB

  • memory/4032-6-0x00000000017F0000-0x00000000017F1000-memory.dmp

    Filesize

    4KB

  • memory/4032-14-0x0000000001880000-0x0000000001881000-memory.dmp

    Filesize

    4KB

  • memory/4032-15-0x0000000002150000-0x0000000002151000-memory.dmp

    Filesize

    4KB

  • memory/4032-16-0x0000000002160000-0x0000000002161000-memory.dmp

    Filesize

    4KB

  • memory/4032-17-0x0000000002170000-0x0000000002171000-memory.dmp

    Filesize

    4KB

  • memory/4032-18-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/4032-20-0x00000000021F0000-0x00000000021F1000-memory.dmp

    Filesize

    4KB

  • memory/4032-19-0x0000000002190000-0x0000000002191000-memory.dmp

    Filesize

    4KB

  • memory/4032-21-0x00000000021A0000-0x00000000021A1000-memory.dmp

    Filesize

    4KB

  • memory/4032-22-0x0000000002210000-0x0000000002211000-memory.dmp

    Filesize

    4KB

  • memory/4032-23-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/4032-25-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/4032-24-0x0000000003DD0000-0x0000000003DD1000-memory.dmp

    Filesize

    4KB

  • memory/4032-29-0x0000000003DF0000-0x0000000003DF1000-memory.dmp

    Filesize

    4KB

  • memory/4032-26-0x0000000003DE0000-0x0000000003DE1000-memory.dmp

    Filesize

    4KB

  • memory/4032-31-0x0000000001850000-0x0000000001852000-memory.dmp

    Filesize

    8KB

  • memory/4032-33-0x0000000002230000-0x0000000002231000-memory.dmp

    Filesize

    4KB

  • memory/4032-32-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/4032-34-0x0000000004150000-0x0000000004151000-memory.dmp

    Filesize

    4KB

  • memory/4032-38-0x0000000003C90000-0x0000000003C91000-memory.dmp

    Filesize

    4KB