Analysis
-
max time kernel
0s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
50f69ec43390f3249ae17357c4c423b2.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
50f69ec43390f3249ae17357c4c423b2.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
50f69ec43390f3249ae17357c4c423b2.exe
-
Size
614KB
-
MD5
50f69ec43390f3249ae17357c4c423b2
-
SHA1
79cc5bfcbc944ed0a7597a5825a4b7d92e62e410
-
SHA256
fba9d8a298da8a38b70660d9bb66a30b97b004814849b266e0688842e6ca8088
-
SHA512
007a7fbd380243ba016a884c5c71237d66d95b54d3705e87d9cdc7f916b291a70e6b86e2eb98dc05b581b9e5e4bb8ea79592a733c5061d209b4fcc6a5c3e5632
-
SSDEEP
12288:ydrbA/jJsCJr/XOYC8FiygeH3XIPLb3eOFxqDTuDhwAg07qYGy2Er9cThCz:ycsM3AeIXTxq/umAg07qYl20WThCz
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f69ec43390f3249ae17357c4c423b2.exe"C:\Users\Admin\AppData\Local\Temp\50f69ec43390f3249ae17357c4c423b2.exe"1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\g_uninstall_240599078.exe"C:\Users\Admin\AppData\Local\Temp\g_uninstall_240599078.exe" /action=uninstall /path="C:\Users\Admin\AppData\Local\Temp"2⤵PID:4988
-