Analysis

  • max time kernel
    109s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 04:23

General

  • Target

    faf316965c64e40422e7e80aa9486533e8ebd5691093e7516e9ae5a0b33571f3.exe

  • Size

    353KB

  • MD5

    d202bb264cd8d361f18b3620efd122de

  • SHA1

    3399aa06ff55a01a6d67aabb2aa44056dbd391c5

  • SHA256

    faf316965c64e40422e7e80aa9486533e8ebd5691093e7516e9ae5a0b33571f3

  • SHA512

    8bf628a2e1f626c0117048f1582cb4c1636a87c07e2e4a1330ac11f178775e95d4039c8cb2163deacb76e35fe2f019d9f41dc4403b282b9a439c37dec12798aa

  • SSDEEP

    3072:h5+1kXrnT2QzzbRnHPPLoAix4U8DvYDq32qO3Izb6IwwLS7fZuBF9:HK42QSfSUumqGt3Iz2IwwLS7fZuBF9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\faf316965c64e40422e7e80aa9486533e8ebd5691093e7516e9ae5a0b33571f3.exe
    "C:\Users\Admin\AppData\Local\Temp\faf316965c64e40422e7e80aa9486533e8ebd5691093e7516e9ae5a0b33571f3.exe"
    1⤵
    • Modifies registry class
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-0-0x00007FF6ECA80000-0x00007FF6ECAA2000-memory.dmp

    Filesize

    136KB