Analysis

  • max time kernel
    0s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 04:06

General

  • Target

    277ad9a96befd3acadc03277123538fa.exe

  • Size

    1.1MB

  • MD5

    277ad9a96befd3acadc03277123538fa

  • SHA1

    1b845efbefe5b3bc5ceecd6a291278c7d85928db

  • SHA256

    3a7e5649bbd07c76e0c70c0a14b14d631d0e3e3438d79a28b8aafb1acfe200a3

  • SHA512

    a35c3d36916570410cdd4642790d6cbd1f9c783ece429d62719beaf3b47ad82d7a5d453da4820a04e3cf12cf726473e9afb5a4437d0c8df04846d5b39f8cd60e

  • SSDEEP

    24576:ov3Pe6k1Bd/2XtmLdK50a6VccpbzVh9uATcVB9lq8fTOuo:ovFkNMt4dzwcJhoATcDDn9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\277ad9a96befd3acadc03277123538fa.exe
    "C:\Users\Admin\AppData\Local\Temp\277ad9a96befd3acadc03277123538fa.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ish259398056\images\progress-bg.png

    Filesize

    2KB

    MD5

    32a6846fe53388eb03be3ada2221297f

    SHA1

    1c1baec7b7fe7a420ccf68d3112384b44f8ba89e

    SHA256

    5c6d20c98c106bc6df49447b9939a90ba6a5e3c20d89ca0621677a7501bdb127

    SHA512

    79c4f3a72467b61c27d6e93415bae3fc61a9fde62aae4202ba8ed1de6328f5facc48092bfe57db70338a0a4b50f571d501eed04aed8b047d20aa28ee7446ce98

  • memory/2072-152-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-147-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-155-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-156-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-149-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-150-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2072-151-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-79-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2072-163-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-0-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-148-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-157-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-158-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-159-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-160-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-161-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-162-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2072-153-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB