Analysis

  • max time kernel
    176s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 21:11

General

  • Target

    1c95dc692e12a6be0ea8fd8fc891e034.exe

  • Size

    258KB

  • MD5

    1c95dc692e12a6be0ea8fd8fc891e034

  • SHA1

    059b4cfeba46f6cf5cebe00c957342c6b58a5adb

  • SHA256

    236ee219f02a96502cf4cbf94e960406d018fd21506113088368e7b18c71e430

  • SHA512

    441e4beb9ea91efdedcff9afb4d59959aad3d0e50c6217ed5ffc0c65df6ce01e9d3a636c651072b5c7d8aa671ab475ad6462de27f4f4567f57c6677c9fed3934

  • SSDEEP

    6144:/VxRVX3qSsL9qg9CRKNpFk2P/ykDE3Vvkc:/XaSsxq4CRKNpFBi3Vvkc

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c95dc692e12a6be0ea8fd8fc891e034.exe
    "C:\Users\Admin\AppData\Local\Temp\1c95dc692e12a6be0ea8fd8fc891e034.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5036-0-0x0000000000B90000-0x0000000000B91000-memory.dmp

    Filesize

    4KB

  • memory/5036-1-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

    Filesize

    4KB

  • memory/5036-2-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

    Filesize

    4KB

  • memory/5036-3-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

    Filesize

    4KB

  • memory/5036-4-0x0000000000BD0000-0x0000000000BF9000-memory.dmp

    Filesize

    164KB

  • memory/5036-5-0x00000000013C0000-0x00000000013EF000-memory.dmp

    Filesize

    188KB

  • memory/5036-9-0x0000000000BD0000-0x0000000000BF9000-memory.dmp

    Filesize

    164KB

  • memory/5036-12-0x0000000002130000-0x0000000002157000-memory.dmp

    Filesize

    156KB

  • memory/5036-16-0x0000000000BD0000-0x0000000000BF9000-memory.dmp

    Filesize

    164KB

  • memory/5036-20-0x0000000000BD0000-0x0000000000BF9000-memory.dmp

    Filesize

    164KB

  • memory/5036-25-0x0000000000BD0000-0x0000000000BF9000-memory.dmp

    Filesize

    164KB