Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:33

General

  • Target

    751aed4594b234563c560cc8a308739d.exe

  • Size

    954KB

  • MD5

    751aed4594b234563c560cc8a308739d

  • SHA1

    425fff11797b20e15bf1015fa463d546e8efdd60

  • SHA256

    049fd29e28518c49846313741fce7875e5c2dc80e4bf9e6f51ca427f8a027ecf

  • SHA512

    d461c51f9847433697865a027bdea1971dbc5164a260224eccfe8eaa19de6178f5e2ac2e776ea26d6c057d7ec649310bbd3e8c8b90a6a8df6484f277de3dfd88

  • SSDEEP

    24576:zooS8us2n3hr++Iv+qBYmBBriQ9gEIpMGcGSZbCvjb1u6Bd:vu5sg2xg5+l3Wd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751aed4594b234563c560cc8a308739d.exe
    "C:\Users\Admin\AppData\Local\Temp\751aed4594b234563c560cc8a308739d.exe"
    1⤵
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\751aed4594b234563c560cc8a308739d.exe:typelib

    Filesize

    8KB

    MD5

    f7c6ba6b4ce77d3ed810c7fb1b470e51

    SHA1

    1d3b0471b77204b5c0ca17ada602bed8f45a3562

    SHA256

    851e5f7092e0a5c5652cd48d370b13d1c2799b90d405b1dd1e5aa52b46c399a0

    SHA512

    da61398fc36fade218c240314a38e8b76ff815dcf9c4e0e942a485c42d849fcea7cf7f63bc82da42de8c6684589fe0f42881dc3b60ec668c368b4c785e8d4b2e

  • memory/1708-0-0x0000000000300000-0x00000000004E3000-memory.dmp

    Filesize

    1.9MB

  • memory/1708-10-0x0000000000700000-0x0000000000701000-memory.dmp

    Filesize

    4KB

  • memory/1708-13-0x0000000000300000-0x00000000004E3000-memory.dmp

    Filesize

    1.9MB