Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 13:48

General

  • Target

    1703.exe

  • Size

    2.5MB

  • MD5

    b1b2ebff6a930fd280f65352012fe799

  • SHA1

    af5d60d5b3b8bd0f0072336454e3904e26858687

  • SHA256

    127ec75b345fd5bb9d334128258d48eb12badd925eaf4859b22cf3e0af59046f

  • SHA512

    d345190f69d2ddb0d911edfa65ab4621f68299a84c28034e5497410449e430c591f220cb93ef94b61a8bbdb5b18bedbb6672445efa7d638d1ccb3c34a11bc334

  • SSDEEP

    24576:Celo5jh+9b8SL1lAdL5+FPI3YqOcHQSFablTmVfmxquGjHneFUJfKhO08v/54eii:7l+h+1qs0Y/BTmZuGjHnevhODi3dwhEm

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1703.exe
    "C:\Users\Admin\AppData\Local\Temp\1703.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1040-1-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB

  • memory/1040-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB