Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 00:35

General

  • Target

    21e7b0f0ae5946d21de974c5f1be04a1.exe

  • Size

    321KB

  • MD5

    21e7b0f0ae5946d21de974c5f1be04a1

  • SHA1

    a598de5e9ede9f8169228333d22470c7c0492598

  • SHA256

    13c0a32e85391730c564387f4028ed40510b0d47f4e3f5d41354065289197e37

  • SHA512

    41c1e7815016e89b2ae22a6390f7f8589a8b9ac8c7a054a2c15c4f3320fbf6e1f996f40364c72e347b36de452a693fcf455e433738d788d5d51b9ee97e45e41f

  • SSDEEP

    6144:FGnm5qhB3O0RhTDkFcDv6iHk68ziipu0WHP5r7bl10O:Anm5qhB3O0RhPkCDx8+Y/+Pxl10O

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21e7b0f0ae5946d21de974c5f1be04a1.exe
    "C:\Users\Admin\AppData\Local\Temp\21e7b0f0ae5946d21de974c5f1be04a1.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:4968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4968-0-0x0000000001010000-0x0000000001110000-memory.dmp

    Filesize

    1024KB

  • memory/4968-9-0x0000000001A20000-0x0000000001A47000-memory.dmp

    Filesize

    156KB

  • memory/4968-2-0x0000000000B50000-0x0000000000B7F000-memory.dmp

    Filesize

    188KB