Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2024, 10:55

General

  • Target

    5b0e3e0bad91bd9eadd181c6edb4c0c4.exe

  • Size

    303KB

  • MD5

    5b0e3e0bad91bd9eadd181c6edb4c0c4

  • SHA1

    fc21a8879bb2546de07edf62688fc1a825e3d710

  • SHA256

    3eba907fa9d44bdb8420b5309c81d6d61ff0869367805ca6e2c3584c2c4b09dc

  • SHA512

    526ec832a5317a48277287a82a61c9db48a29d3d83820157256b570d4163f80fdff994200be60b6bd75a77c5ca62f517d34bffcfb7ac83c38d5e5de03ea89a24

  • SSDEEP

    6144:tTfFDbRnOTrt5Jya339EO0IFA0V1iVKQOFHnMEB8BXrmBQ9ktNMIgvI:D5OHH9t0ATT5FH3B8BXrmBriIgvI

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b0e3e0bad91bd9eadd181c6edb4c0c4.exe
    "C:\Users\Admin\AppData\Local\Temp\5b0e3e0bad91bd9eadd181c6edb4c0c4.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1548-18-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB