Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:18
Behavioral task
behavioral1
Sample
74f3e7e162caba015bcc4bdaa8c80991.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
74f3e7e162caba015bcc4bdaa8c80991.exe
-
Size
1.3MB
-
MD5
74f3e7e162caba015bcc4bdaa8c80991
-
SHA1
469f811556d705484f47eee1412997c306cc5ca3
-
SHA256
d00b779d3e2f1d39719e17066b974726618bee508089678e8a7c5e8f2c182ae4
-
SHA512
70d291f8aee93dd1c1d0556128813df7c4dd32459d73ca3d5fbfea286a610483ec38989e7297cbcb1fdd4b5f7a8690b76430e8ebfce2d9882855801850be1467
-
SSDEEP
24576:MN4F+KjpW/A103tCFZtqLQeVy4KsdHvceFbzxTh:yE6eZiTVy4NJ/bzxT
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral1/memory/2380-2-0x0000000000400000-0x0000000000551000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
74f3e7e162caba015bcc4bdaa8c80991.exepid process 2380 74f3e7e162caba015bcc4bdaa8c80991.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2380-0-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2380-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2380-2-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2380-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB