Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 13:13

General

  • Target

    50a72f19652308266547ec03053a3ef4.exe

  • Size

    367KB

  • MD5

    50a72f19652308266547ec03053a3ef4

  • SHA1

    7da69807908e53e67cd5c0438f94fdcee3f7be20

  • SHA256

    1624e3b64ba7fd69fb3d97c348f1d2370566a9fe4def959253695cb47e1e5197

  • SHA512

    1cae7e04ce4f8077995c412561b1eb4e123a9a49dd9e2f0a6131f36412f655c934cf42595bc9cd25ac51ef830f573d856c9f0decc478e99b4cf4b292307a9183

  • SSDEEP

    6144:E/vb7ocC7zro2qNTjUmPcX3X9Xt+UPoexJdDdpcf9eqht+nE/qQs:4nocCX+omk399+wIU0s

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\50a72f19652308266547ec03053a3ef4.exe
    "C:\Users\Admin\AppData\Local\Temp\50a72f19652308266547ec03053a3ef4.exe"
    1⤵
    • Drops startup file
    PID:3516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3516-0-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/3516-1-0x00000000001A0000-0x00000000001A2000-memory.dmp

    Filesize

    8KB

  • memory/3516-3-0x0000000000930000-0x0000000000931000-memory.dmp

    Filesize

    4KB

  • memory/3516-6-0x0000000000970000-0x0000000000971000-memory.dmp

    Filesize

    4KB

  • memory/3516-7-0x0000000000A70000-0x0000000000A9C000-memory.dmp

    Filesize

    176KB

  • memory/3516-11-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB

  • memory/3516-8-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/3516-33-0x0000000003330000-0x0000000003331000-memory.dmp

    Filesize

    4KB

  • memory/3516-32-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

    Filesize

    4KB

  • memory/3516-31-0x00000000009D0000-0x00000000009D2000-memory.dmp

    Filesize

    8KB

  • memory/3516-30-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

    Filesize

    4KB

  • memory/3516-29-0x0000000002FB0000-0x0000000002FB1000-memory.dmp

    Filesize

    4KB

  • memory/3516-26-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

    Filesize

    4KB

  • memory/3516-25-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

    Filesize

    4KB

  • memory/3516-24-0x0000000002F90000-0x0000000002F91000-memory.dmp

    Filesize

    4KB

  • memory/3516-23-0x0000000002F80000-0x0000000002F81000-memory.dmp

    Filesize

    4KB

  • memory/3516-22-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

    Filesize

    4KB

  • memory/3516-21-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/3516-20-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

    Filesize

    4KB

  • memory/3516-19-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/3516-18-0x0000000000A50000-0x0000000000A51000-memory.dmp

    Filesize

    4KB

  • memory/3516-17-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/3516-16-0x0000000000A20000-0x0000000000A21000-memory.dmp

    Filesize

    4KB

  • memory/3516-15-0x0000000000A10000-0x0000000000A11000-memory.dmp

    Filesize

    4KB

  • memory/3516-14-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/3516-13-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/3516-5-0x0000000000960000-0x0000000000961000-memory.dmp

    Filesize

    4KB

  • memory/3516-4-0x0000000000950000-0x0000000000951000-memory.dmp

    Filesize

    4KB

  • memory/3516-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/3516-38-0x0000000002EC0000-0x0000000002EC1000-memory.dmp

    Filesize

    4KB