Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
4285342e5ff998b52c377530c927fcff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4285342e5ff998b52c377530c927fcff.exe
Resource
win10v2004-20231215-en
General
-
Target
4285342e5ff998b52c377530c927fcff.exe
-
Size
751KB
-
MD5
4285342e5ff998b52c377530c927fcff
-
SHA1
bb61f34d8c1f2f6c5613b446cebb7f9941cd5e3c
-
SHA256
8dc81e8f6c9ec1269a98e5fc1b10fb97df8da2a206dc6e4a098c2cd7796e5204
-
SHA512
ca4b5802614a688f65890d5b23ba9b56794c976712d4b744440d60297c3fbd1e543edb73f2cff8f97929b2dd2282bd88d140f21db58aa80f3f5917fa70019b6e
-
SSDEEP
12288:FEp4lZb8D45y4I2vy30ggZKvix8BJk3Ig0xPdnOuqFYyhmbK:FKgZFyp2v3ggsKmM3oV8u6hmbK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main 4285342e5ff998b52c377530c927fcff.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\lnkfile 4285342e5ff998b52c377530c927fcff.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52b5158da5ffbd536134e243a9b5c3fd7
SHA1706fce0ad0b0f2bd7b0d9898c2e5c8a51d1962e6
SHA256804665ab96c9baf72c63e4e9676ee3776406c53800dd131cca1738d04515b734
SHA512fb66f5bcab2e07812b20139030af41dcf60324964e54baa5028dc0ba1528b657b27b9deba868c8590cdbc3862978c329616e5665c1d7ac67c62b85797b905437