Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2024 10:03

General

  • Target

    4e049460aced9b6cda378c0f6b7054d8.exe

  • Size

    486KB

  • MD5

    4e049460aced9b6cda378c0f6b7054d8

  • SHA1

    6f72e78ffb274ecb76612ca16014dae7de44fdd5

  • SHA256

    368d49dcd70a3be4b15768f6b4f8de48e99efbda8cc731c45cf3d6b9e3617859

  • SHA512

    fee20eeed0def3151a7ca6c9b031c9fcb58f9bd6ed9efe14c231db678f6536ef18aa62e00be5ea0c7691ea8b3802d39383065d58dde22e27229b6e8da7b299fd

  • SSDEEP

    12288:wgSmNA7fXjNeVDeO+AiPuef6ztouOiNFRM8J1EHOGCpwUy:w7zf5G5+T6hcoFRMgEHO5wUy

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e049460aced9b6cda378c0f6b7054d8.exe
    "C:\Users\Admin\AppData\Local\Temp\4e049460aced9b6cda378c0f6b7054d8.exe"
    1⤵
    • Drops startup file
    PID:3312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3312-2-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

    Filesize

    4KB

  • memory/3312-3-0x0000000001D50000-0x0000000001D51000-memory.dmp

    Filesize

    4KB

  • memory/3312-6-0x0000000003A20000-0x0000000003A4C000-memory.dmp

    Filesize

    176KB

  • memory/3312-5-0x0000000001D80000-0x0000000001D81000-memory.dmp

    Filesize

    4KB

  • memory/3312-4-0x0000000001D70000-0x0000000001D71000-memory.dmp

    Filesize

    4KB

  • memory/3312-8-0x0000000001D90000-0x0000000001D91000-memory.dmp

    Filesize

    4KB

  • memory/3312-10-0x0000000001DA0000-0x0000000001DA1000-memory.dmp

    Filesize

    4KB

  • memory/3312-34-0x0000000003E30000-0x0000000003E31000-memory.dmp

    Filesize

    4KB

  • memory/3312-33-0x0000000003A60000-0x0000000003A61000-memory.dmp

    Filesize

    4KB

  • memory/3312-32-0x0000000001DB0000-0x0000000001DB2000-memory.dmp

    Filesize

    8KB

  • memory/3312-31-0x0000000003AD0000-0x0000000003AD1000-memory.dmp

    Filesize

    4KB

  • memory/3312-30-0x0000000003AC0000-0x0000000003AC1000-memory.dmp

    Filesize

    4KB

  • memory/3312-29-0x0000000003AB0000-0x0000000003AB1000-memory.dmp

    Filesize

    4KB

  • memory/3312-28-0x0000000003AA0000-0x0000000003AA1000-memory.dmp

    Filesize

    4KB

  • memory/3312-27-0x0000000003A90000-0x0000000003A91000-memory.dmp

    Filesize

    4KB

  • memory/3312-26-0x0000000003A80000-0x0000000003A81000-memory.dmp

    Filesize

    4KB

  • memory/3312-25-0x0000000001DC0000-0x0000000001DC1000-memory.dmp

    Filesize

    4KB

  • memory/3312-24-0x0000000003A70000-0x0000000003A71000-memory.dmp

    Filesize

    4KB

  • memory/3312-23-0x0000000003A50000-0x0000000003A51000-memory.dmp

    Filesize

    4KB

  • memory/3312-19-0x0000000003A10000-0x0000000003A11000-memory.dmp

    Filesize

    4KB

  • memory/3312-18-0x0000000003A00000-0x0000000003A01000-memory.dmp

    Filesize

    4KB

  • memory/3312-17-0x00000000039F0000-0x00000000039F1000-memory.dmp

    Filesize

    4KB

  • memory/3312-16-0x00000000039E0000-0x00000000039E1000-memory.dmp

    Filesize

    4KB

  • memory/3312-15-0x00000000039D0000-0x00000000039D1000-memory.dmp

    Filesize

    4KB

  • memory/3312-14-0x00000000039C0000-0x00000000039C1000-memory.dmp

    Filesize

    4KB

  • memory/3312-13-0x00000000039B0000-0x00000000039B1000-memory.dmp

    Filesize

    4KB

  • memory/3312-12-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

    Filesize

    4KB

  • memory/3312-1-0x0000000000DD0000-0x0000000000DD2000-memory.dmp

    Filesize

    8KB

  • memory/3312-0-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB