Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:14
Behavioral task
behavioral1
Sample
242715a0c26937bd247db8a19e8a002c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
242715a0c26937bd247db8a19e8a002c.exe
Resource
win10v2004-20231215-en
General
-
Target
242715a0c26937bd247db8a19e8a002c.exe
-
Size
358KB
-
MD5
242715a0c26937bd247db8a19e8a002c
-
SHA1
946a248201f1c350db979ed46c06af6f7b191a0b
-
SHA256
222df715f1f1f759db04067dc0ba0069de0beb8ef0e8f53f4a0fbb4b5c01e93a
-
SHA512
b05f56285872add95c407e6dc9054649d55a8691270259a4c50c1cbfb7ba538d6105c4c334eb2b5849ed3e26c48926d198c1700bec52e1e3bfaaf269ac1707da
-
SSDEEP
6144:Gl8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoS0:Gl837cCHJrccvZPRjoS0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2488-0-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral2/memory/2488-12-0x0000000000400000-0x000000000050C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 242715a0c26937bd247db8a19e8a002c.exe 2488 242715a0c26937bd247db8a19e8a002c.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d487c33bbbd6a2601fb82059e5581e16
SHA1c337345173e391cf9f15760bb61da80bb839d986
SHA256dbe271994a35a565fb4fc9f6b7c75c61efe03f7b03dd54b05170b4fdd4f0a7a1
SHA51247182a2435138d204e8fc36a784eae3510f70c060e0a03b72773a7a95110f0c6dea7620e1a4527e708f685aef60d1e244eef74fb9157a3a541268086d8526e3d