Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
4a2050b484310092b87d82be1d3b094f.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a2050b484310092b87d82be1d3b094f.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4a2050b484310092b87d82be1d3b094f.exe
-
Size
456KB
-
MD5
4a2050b484310092b87d82be1d3b094f
-
SHA1
48b70cb02afe9ada5f5aa70a397e349e636cbc36
-
SHA256
148c572f006f34a1d4abcd4e31849506449228212b671e6f0139f3fcb8cd0a31
-
SHA512
750f4778da1968e28d6e3bf1071c8d89a58e6dc76e1859bc337c3bafc820ef2111d122b4792ec1c2fb0a8ade666c5b6990a050bffa03c4a223c177767c71d58a
-
SSDEEP
6144:NgqAaPKebqwYY6lKVph0Zsh8uc6+PpmTFfvvtlUMrvPGazBz/5x3sTpW0MkoMzn9:6MPjqMseWsh1TZ3tlr9tle
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4a2050b484310092b87d82be1d3b094f.lnk 4a2050b484310092b87d82be1d3b094f.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 4a2050b484310092b87d82be1d3b094f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).