Analysis

  • max time kernel
    134s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 02:02

General

  • Target

    23bd7ad3d0009312fc4d40f4956a74d9.exe

  • Size

    367KB

  • MD5

    23bd7ad3d0009312fc4d40f4956a74d9

  • SHA1

    ca73c641d51fa414b78b5eaa9c6f652294178f2f

  • SHA256

    2442ce630818c4da838827e4df2f5a667d64902e11061183cd1d0f48bc5ae66b

  • SHA512

    03c1e2c26d8711143ce9b0a0fd99e0e3f630fcd03dbe89fb0768de084f13b9e1af14b3003880c4068e8abfb89c26b7a171f755704ebf79d5f3b149c4c452aee2

  • SSDEEP

    6144:HdIbc87paJizy6RF2qNTj5PcX3X9Xt+UPo2NGaAyvMizTctP0766XLlTeLvLn3T:HdxypaJAy6Jtk399+sF013T

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\23bd7ad3d0009312fc4d40f4956a74d9.exe
    "C:\Users\Admin\AppData\Local\Temp\23bd7ad3d0009312fc4d40f4956a74d9.exe"
    1⤵
    • Drops startup file
    PID:4380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4380-0-0x0000000000B70000-0x0000000000B71000-memory.dmp

    Filesize

    4KB

  • memory/4380-1-0x0000000000B80000-0x0000000000B82000-memory.dmp

    Filesize

    8KB

  • memory/4380-2-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

    Filesize

    4KB

  • memory/4380-3-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/4380-4-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

    Filesize

    4KB

  • memory/4380-5-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/4380-6-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

    Filesize

    4KB

  • memory/4380-8-0x0000000001440000-0x0000000001441000-memory.dmp

    Filesize

    4KB

  • memory/4380-7-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

    Filesize

    4KB

  • memory/4380-10-0x0000000001460000-0x0000000001461000-memory.dmp

    Filesize

    4KB

  • memory/4380-12-0x00000000038F0000-0x000000000391C000-memory.dmp

    Filesize

    176KB

  • memory/4380-11-0x0000000001470000-0x0000000001471000-memory.dmp

    Filesize

    4KB

  • memory/4380-9-0x0000000001450000-0x0000000001451000-memory.dmp

    Filesize

    4KB

  • memory/4380-14-0x00000000038C0000-0x00000000038C1000-memory.dmp

    Filesize

    4KB

  • memory/4380-15-0x0000000003920000-0x0000000003921000-memory.dmp

    Filesize

    4KB

  • memory/4380-18-0x0000000003940000-0x0000000003941000-memory.dmp

    Filesize

    4KB

  • memory/4380-19-0x0000000003950000-0x0000000003951000-memory.dmp

    Filesize

    4KB

  • memory/4380-20-0x0000000003960000-0x0000000003961000-memory.dmp

    Filesize

    4KB

  • memory/4380-21-0x0000000003970000-0x0000000003971000-memory.dmp

    Filesize

    4KB

  • memory/4380-22-0x0000000003980000-0x0000000003981000-memory.dmp

    Filesize

    4KB

  • memory/4380-23-0x00000000039B0000-0x00000000039B1000-memory.dmp

    Filesize

    4KB

  • memory/4380-24-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/4380-25-0x00000000038D0000-0x00000000038D1000-memory.dmp

    Filesize

    4KB

  • memory/4380-26-0x00000000038E0000-0x00000000038E1000-memory.dmp

    Filesize

    4KB

  • memory/4380-29-0x0000000003990000-0x0000000003991000-memory.dmp

    Filesize

    4KB

  • memory/4380-30-0x00000000039A0000-0x00000000039A1000-memory.dmp

    Filesize

    4KB

  • memory/4380-28-0x0000000003930000-0x0000000003931000-memory.dmp

    Filesize

    4KB

  • memory/4380-27-0x0000000001420000-0x0000000001422000-memory.dmp

    Filesize

    8KB

  • memory/4380-31-0x00000000039C0000-0x00000000039C1000-memory.dmp

    Filesize

    4KB

  • memory/4380-38-0x00000000039E0000-0x00000000039E1000-memory.dmp

    Filesize

    4KB