Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:18
Behavioral task
behavioral1
Sample
74f3e7e162caba015bcc4bdaa8c80991.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
74f3e7e162caba015bcc4bdaa8c80991.exe
-
Size
1.3MB
-
MD5
74f3e7e162caba015bcc4bdaa8c80991
-
SHA1
469f811556d705484f47eee1412997c306cc5ca3
-
SHA256
d00b779d3e2f1d39719e17066b974726618bee508089678e8a7c5e8f2c182ae4
-
SHA512
70d291f8aee93dd1c1d0556128813df7c4dd32459d73ca3d5fbfea286a610483ec38989e7297cbcb1fdd4b5f7a8690b76430e8ebfce2d9882855801850be1467
-
SSDEEP
24576:MN4F+KjpW/A103tCFZtqLQeVy4KsdHvceFbzxTh:yE6eZiTVy4NJ/bzxT
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3824-0-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral2/memory/3824-2-0x0000000000400000-0x0000000000551000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
74f3e7e162caba015bcc4bdaa8c80991.exepid process 3824 74f3e7e162caba015bcc4bdaa8c80991.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3824-0-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/3824-1-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/3824-2-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/3824-3-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB