Analysis
-
max time kernel
0s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 09:44
Behavioral task
behavioral1
Sample
4b1a47dcf799e72c29d3c8d9bbcbc16a.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b1a47dcf799e72c29d3c8d9bbcbc16a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4b1a47dcf799e72c29d3c8d9bbcbc16a.exe
-
Size
680KB
-
MD5
4b1a47dcf799e72c29d3c8d9bbcbc16a
-
SHA1
0148d9893597259904d991b6d8821b2aa1b4ae31
-
SHA256
f6f4eadbc0b76e0c78c73c78835359d75d293e1711e2cb6f72664a677aee920a
-
SHA512
d999f953fac66e0c1f3337afee0c8f36ee6ec1c88b4c364d55bdc9660230ef7e3f27cf16db4affbcc135c9a6b30d6a8c15ae121c79ffd91bcae91e523b71711e
-
SSDEEP
12288:d3DAAw0jmgI7E8Gq2VvhxNOMfg33sUKpfcsFmcyouqa3wTQipk:d3DXw0agI7EjVvHXg33OpfPFmcyouqa7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3064-0-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral1/memory/3064-75-0x0000000000400000-0x00000000005B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3064 4b1a47dcf799e72c29d3c8d9bbcbc16a.exe 3064 4b1a47dcf799e72c29d3c8d9bbcbc16a.exe