Analysis
-
max time kernel
0s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
160440bf575431002781efd3c9a6042c.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
160440bf575431002781efd3c9a6042c.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
160440bf575431002781efd3c9a6042c.exe
-
Size
114KB
-
MD5
160440bf575431002781efd3c9a6042c
-
SHA1
3dcfaab7368d9c47de4203faf2a6a7da4af8c9eb
-
SHA256
108e391172d4a66d1adce510c5a10a93478496886c236837437341f8568abf05
-
SHA512
587ffda127bb7555e134e544a3aba0e449e92cd38f7976b12b2fa8d24efb1b3b52d9bb58c2b8e122e09158cbc99aadeff3fcf14c26160808abffdf6a1f0a3741
-
SSDEEP
3072:dX7DItrfaocyTgfsqQOlJnGZPnz6Y3zbVlKMxII85:dsaocyLC0nz6UzbV8O25
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2088 160440bf575431002781efd3c9a6042c.exe 2088 160440bf575431002781efd3c9a6042c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\160440bf575431002781efd3c9a6042c.exe"C:\Users\Admin\AppData\Local\Temp\160440bf575431002781efd3c9a6042c.exe"1⤵
- Loads dropped DLL
PID:2088 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://torrent3.ru/uploads/torrent/Plants-vs-Zombies-Garden-Warfare.torrent2⤵PID:2736
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:21⤵PID:2712