Analysis
-
max time kernel
22s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
54651254208d18cd5567ce9f562936fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54651254208d18cd5567ce9f562936fb.exe
Resource
win10v2004-20231222-en
General
-
Target
54651254208d18cd5567ce9f562936fb.exe
-
Size
228KB
-
MD5
54651254208d18cd5567ce9f562936fb
-
SHA1
6fca7f77ff8235dc481fae1b3b53eab820825b1b
-
SHA256
8df3d3ed6875932be1c80b67d11f05f3d85260d4399fa6d9b6d36806955adb4e
-
SHA512
c70491ff1615a30a5c2b5773ca9ed6cdf8e6dc49558666aa36500c371c9e52b17093c6b9d05b301aa6bdf6794b864ad7654b003a7cad375338fa2e19ede4c695
-
SSDEEP
6144:7n53PFKs7H4p7+8EqxF6snji81RUinK6:T1Phu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2396 54651254208d18cd5567ce9f562936fb.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5a8d3c2fa0e1817e3e44db34c8eea6ca2
SHA1cdf1e0163f707b06fa15f31733fd01d47adcdae6
SHA256e8c809a66f20af8aa0e8d4f86ca889d11749798ccf1de95ac71adef806df79d7
SHA5127c25bac2d5a6479eba1ca6708931880ebc5f6d7444372ed2d4c5ee7189af29a833127fe906650f6a2d88c06020d3cac20bbd1112f19683b537c06b9c4126ec67