Analysis

  • max time kernel
    134s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 09:24

General

  • Target

    146714bafcdb844ca1ca74b5d05f08e9.exe

  • Size

    456KB

  • MD5

    146714bafcdb844ca1ca74b5d05f08e9

  • SHA1

    f1a30f41b6a18f9573c64912960b08634853a300

  • SHA256

    110feae119793ba7c4825b912c930dee14868400c7ad35df3b17180bb97e05f9

  • SHA512

    00c6ebc6a80200117b781b69842123a40f0915748f0162647d15b4c37b92012915fb41884a304b6a9c75dcf7f81d90bf4541b3bb12886867b91253e378c59221

  • SSDEEP

    6144:6IR7FB50TjDw68ZVJcQ2lshQmU0Qu0beSK9O0YmIjxUSjMXQh9MgTbklllQwcWiG:6W7FB50/DwrVJqlnmUBHeSK9amIVUJjJ

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\146714bafcdb844ca1ca74b5d05f08e9.exe
    "C:\Users\Admin\AppData\Local\Temp\146714bafcdb844ca1ca74b5d05f08e9.exe"
    1⤵
    • Drops startup file
    PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5064-0-0x0000000000E20000-0x0000000000E21000-memory.dmp

    Filesize

    4KB

  • memory/5064-1-0x0000000000E30000-0x0000000000E32000-memory.dmp

    Filesize

    8KB

  • memory/5064-2-0x0000000000E40000-0x0000000000E41000-memory.dmp

    Filesize

    4KB

  • memory/5064-3-0x0000000001440000-0x0000000001441000-memory.dmp

    Filesize

    4KB

  • memory/5064-4-0x0000000001460000-0x0000000001461000-memory.dmp

    Filesize

    4KB

  • memory/5064-6-0x0000000001490000-0x0000000001491000-memory.dmp

    Filesize

    4KB

  • memory/5064-5-0x0000000001470000-0x0000000001471000-memory.dmp

    Filesize

    4KB

  • memory/5064-7-0x00000000014A0000-0x00000000014A1000-memory.dmp

    Filesize

    4KB

  • memory/5064-8-0x0000000001500000-0x0000000001501000-memory.dmp

    Filesize

    4KB

  • memory/5064-9-0x0000000001510000-0x0000000001511000-memory.dmp

    Filesize

    4KB

  • memory/5064-10-0x0000000001520000-0x0000000001521000-memory.dmp

    Filesize

    4KB

  • memory/5064-11-0x0000000003970000-0x0000000003971000-memory.dmp

    Filesize

    4KB

  • memory/5064-12-0x0000000003980000-0x0000000003981000-memory.dmp

    Filesize

    4KB

  • memory/5064-13-0x00000000039A0000-0x00000000039A1000-memory.dmp

    Filesize

    4KB

  • memory/5064-15-0x00000000039F0000-0x00000000039F1000-memory.dmp

    Filesize

    4KB

  • memory/5064-14-0x00000000039B0000-0x00000000039B1000-memory.dmp

    Filesize

    4KB

  • memory/5064-16-0x0000000003A10000-0x0000000003A11000-memory.dmp

    Filesize

    4KB

  • memory/5064-17-0x0000000003A20000-0x0000000003A21000-memory.dmp

    Filesize

    4KB

  • memory/5064-18-0x0000000003A30000-0x0000000003A31000-memory.dmp

    Filesize

    4KB

  • memory/5064-22-0x0000000003A00000-0x0000000003A01000-memory.dmp

    Filesize

    4KB

  • memory/5064-20-0x0000000003990000-0x0000000003991000-memory.dmp

    Filesize

    4KB

  • memory/5064-19-0x0000000003A40000-0x0000000003A41000-memory.dmp

    Filesize

    4KB

  • memory/5064-21-0x00000000014F0000-0x00000000014F2000-memory.dmp

    Filesize

    8KB

  • memory/5064-23-0x0000000003A50000-0x0000000003A51000-memory.dmp

    Filesize

    4KB

  • memory/5064-24-0x0000000003A60000-0x0000000003A61000-memory.dmp

    Filesize

    4KB

  • memory/5064-25-0x0000000003A70000-0x0000000003A71000-memory.dmp

    Filesize

    4KB

  • memory/5064-26-0x00000000039C0000-0x00000000039EC000-memory.dmp

    Filesize

    176KB

  • memory/5064-29-0x0000000003A80000-0x0000000003A81000-memory.dmp

    Filesize

    4KB

  • memory/5064-31-0x0000000003A90000-0x0000000003A91000-memory.dmp

    Filesize

    4KB

  • memory/5064-38-0x00000000058D0000-0x00000000058D1000-memory.dmp

    Filesize

    4KB