Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 03:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f9ebc3ce09b5aaa97dc58d7cd45051c.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f9ebc3ce09b5aaa97dc58d7cd45051c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7f9ebc3ce09b5aaa97dc58d7cd45051c.exe
-
Size
2.2MB
-
MD5
7f9ebc3ce09b5aaa97dc58d7cd45051c
-
SHA1
544a0c714ac918206a03108df76224f967fee6a3
-
SHA256
93de9c5aeabeda655e66cd32304f68cc035d9ab9627c6f84d722b97e3be5e1dd
-
SHA512
a82968fce0be9b3d8eb012eb3184dac323cfea10788bef2bc50f23dddf4087e087b264b0600284f85481d3ab6f00e99d018379939d92cc4e335183b26d0bde8b
-
SSDEEP
49152:OAI+l/UFFnU5coIeedKAM0lxvLaU7ln3zRTtWU:OAI+aFRMcoIeekT+xvpln3zrWU
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4800 7f9ebc3ce09b5aaa97dc58d7cd45051c.exe 4800 7f9ebc3ce09b5aaa97dc58d7cd45051c.exe