Analysis
-
max time kernel
131s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 06:12
Behavioral task
behavioral1
Sample
10c80bf2cb766cc28dac2ca89cc60897.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10c80bf2cb766cc28dac2ca89cc60897.exe
Resource
win10v2004-20231215-en
General
-
Target
10c80bf2cb766cc28dac2ca89cc60897.exe
-
Size
357KB
-
MD5
10c80bf2cb766cc28dac2ca89cc60897
-
SHA1
1de71a42d68a7929dcedad9e11e801ad5d347757
-
SHA256
c3484807ccd09192afd0fc21e5b1044e4205505360963b9127c580daeaf0385f
-
SHA512
f46b61dce1a4fd8adc07cfe70c2848ce303e92250f8b601396f97311938922408b9b647c1ed845c8b9647bf220f515d004806e5b388746e9e5bad81e5c57b137
-
SSDEEP
6144:D8yZw0EMTNHw7Ip+rKUEqpjyfe03qJf1zw4T/+8zXTfwcDKl+oSU:YZ0btw6+rK5qkfe03j4j+cD4choS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2896-0-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral1/memory/2896-11-0x0000000000400000-0x000000000050A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2896 10c80bf2cb766cc28dac2ca89cc60897.exe 2896 10c80bf2cb766cc28dac2ca89cc60897.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a63dae8abacae8356cf159d14366db07
SHA1ef173e176a584276b6d1fb9028dc6ed5e62b6b1a
SHA256179f19b83f74ad016295fd3771527c504f3077dd915b6b615c30f2eed9eb8729
SHA512a8d53bc91878627214f1074c0b233f8872fdb80d17ca1c2ebbc8408cef13a87201dc92db2136c2efc95ee1a8ad11fe29c5f258fb119cc218025c50df72ae19dc