Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:32

General

  • Target

    tmp.exe

  • Size

    301KB

  • MD5

    d7e07baf23641fa08a4067ca07ea4b4d

  • SHA1

    eda4e790cde8b30cb46558b94415e4a916f56e78

  • SHA256

    c7cbef34bbc2ae01c9131646954a2fec8ab6f7cbd70ee2d92eada6796884e1b8

  • SHA512

    ffc65c88345d482bbfe100f8ca804b4470dedab81c580873e5134872d41aa74c9bb11c3978165b0f62e275b2c95f2c158f02222d02e64f7e794bc157699f89a5

  • SSDEEP

    6144:HhjGvEehzo1urn+utlHJ3hfcAOqGJF/p/uwONct43j92UysA:H12Eehzo1uDkf9pGHNu4B2UW

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1572-2-0x0000000000450000-0x0000000000451000-memory.dmp

    Filesize

    4KB

  • memory/1572-4-0x0000000000940000-0x00000000009C1000-memory.dmp

    Filesize

    516KB

  • memory/1572-3-0x0000000000DD0000-0x0000000000DF2000-memory.dmp

    Filesize

    136KB

  • memory/1572-5-0x0000000000DD0000-0x0000000000DF2000-memory.dmp

    Filesize

    136KB

  • memory/1572-6-0x0000000000DD0000-0x0000000000DF2000-memory.dmp

    Filesize

    136KB

  • memory/1572-7-0x0000000000DD0000-0x0000000000DF2000-memory.dmp

    Filesize

    136KB

  • memory/1572-8-0x0000000002920000-0x0000000002952000-memory.dmp

    Filesize

    200KB

  • memory/1572-9-0x00000000029C0000-0x00000000029F8000-memory.dmp

    Filesize

    224KB

  • memory/1572-10-0x00000000029C0000-0x00000000029F8000-memory.dmp

    Filesize

    224KB

  • memory/1572-11-0x00000000029C0000-0x00000000029F8000-memory.dmp

    Filesize

    224KB

  • memory/1572-13-0x00000000029C0000-0x00000000029F8000-memory.dmp

    Filesize

    224KB

  • memory/1572-12-0x00000000029C0000-0x00000000029F8000-memory.dmp

    Filesize

    224KB

  • memory/1572-14-0x0000000000DD0000-0x0000000000DF2000-memory.dmp

    Filesize

    136KB

  • memory/1572-15-0x0000000000DD0000-0x0000000000DF2000-memory.dmp

    Filesize

    136KB

  • memory/1572-16-0x00000000029C0000-0x00000000029F8000-memory.dmp

    Filesize

    224KB