Analysis

  • max time kernel
    0s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 08:49

General

  • Target

    53123f2484e4d31d2108a15727a96a2e.exe

  • Size

    789KB

  • MD5

    53123f2484e4d31d2108a15727a96a2e

  • SHA1

    495228327ac80ec0e91082970dfce36c2a0929d8

  • SHA256

    059d000959ec7b94678eee6b779594c8f8771760d4392af80df79e4cfb41eaa4

  • SHA512

    8ad4bb0c6dd1ddaacbe809f464439f575c5a920122a72c57d96cf68c5419798fa852583bef9e9ed461a5df7825a1e2d1eb8ad6977cded7c0d488d15f2c3fb934

  • SSDEEP

    12288:2xpJ/xOJ5iQ/817fkZZ3Yzboo9RM6RS3r8Qksh0+vhd00hx+9BWEXS3BNmn:Cppxs5iQ/817L0o9q6RSg0d0YJEi3BNs

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 16 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\53123f2484e4d31d2108a15727a96a2e.exe
    "C:\Users\Admin\AppData\Local\Temp\53123f2484e4d31d2108a15727a96a2e.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    PID:960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/960-15-0x0000000002440000-0x0000000002468000-memory.dmp

    Filesize

    160KB

  • memory/960-191-0x0000000003480000-0x000000000348C000-memory.dmp

    Filesize

    48KB

  • memory/960-186-0x0000000003480000-0x000000000348C000-memory.dmp

    Filesize

    48KB

  • memory/960-123-0x0000000003450000-0x000000000345E000-memory.dmp

    Filesize

    56KB

  • memory/960-86-0x00000000024A0000-0x00000000024B6000-memory.dmp

    Filesize

    88KB

  • memory/960-333-0x0000000002490000-0x0000000002499000-memory.dmp

    Filesize

    36KB