Analysis

  • max time kernel
    2s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2024 20:28

General

  • Target

    7a33320347199af40d65eed59dcc2a61.exe

  • Size

    547KB

  • MD5

    7a33320347199af40d65eed59dcc2a61

  • SHA1

    dee1f7559517bd0cad0ce1d177886ea8df17f2a4

  • SHA256

    ffa0a83de105cdc69f4adc8db6d3a3c60d6388ad8a977f7a5f51075244adc9d0

  • SHA512

    c825eb36edca5786e138ea159963dad14236afd8d673b1ee19498fb9d6bcea12788334a982b9587093bcbf20752dfd17183e50a9702c97b51bb2ea46536a3b49

  • SSDEEP

    3072:sPgp5XXRvjxCb5NgXDY7uSlkJcUa7kYQTcqW2NdQQGH/UDhSCUc4aqTBW1pr/:UElKgzelZNQSBQGH/CSpWqTW

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a33320347199af40d65eed59dcc2a61.exe
    "C:\Users\Admin\AppData\Local\Temp\7a33320347199af40d65eed59dcc2a61.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.cab

    Filesize

    92KB

    MD5

    d1b7eb6d1452348ed30cca4a59229224

    SHA1

    d96b3a6d42f73c9a6b68392d6adf1b1e14c3062e

    SHA256

    25a447598b343dddbc19db74be1c8f66a78ddd23e9a4dc6af162079827482b0b

    SHA512

    2ed32272b98e4038602bd94ed8199dd4c269d8ee7dd69e71c2097e4055714d61ef4468abdf67d535c887353ead87cb4e9cc04f199ae8cb5753505fb2cf964e97

  • C:\Program Files\7-Zip\7z.exe

    Filesize

    92KB

    MD5

    431780234d2e4ebfd70bd7c0835be1c1

    SHA1

    f3632d698c8fd917eb177dacfbce6ec6430f3cc2

    SHA256

    9955d256596721e206b474e861a40e12055f3f4b7a666fbb8ee5ffe678aa3248

    SHA512

    a3e96d28bcf3b65e6bc3476416f7f3b7fde573e5bf12b102fb020969c9ef72ce55b9a06af4e1e3381fbf7ad8a531e70e9a1a49d7c7025d742e0ba6d341627ebe

  • memory/2268-0-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2268-588-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB