Analysis

  • max time kernel
    140s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 17:36

General

  • Target

    7d97c29cc6c78cdc1b87593718d36b17.exe

  • Size

    255KB

  • MD5

    7d97c29cc6c78cdc1b87593718d36b17

  • SHA1

    7f0d62add9ab28ac5bee0c159ba5ff8c35157fc9

  • SHA256

    165d5f00d785839d1694f8551979d2da2a5f928b96ddd0c7595ca9118f161745

  • SHA512

    d290b2becc6c662881e0551f6b09d8c1de5c33fb518c08e1e71d0e00d16e021b7d63272713251101da7a77816d9387db2500b44982abb696c4d65c2f305d271d

  • SSDEEP

    6144:SbX7/jbFz44UWyF966fSdgewsVeMnnk1YLMlM:errRU7v9R6dgdOesnk1YAlM

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d97c29cc6c78cdc1b87593718d36b17.exe
    "C:\Users\Admin\AppData\Local\Temp\7d97c29cc6c78cdc1b87593718d36b17.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:4776

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4776-0-0x0000000000380000-0x0000000000381000-memory.dmp

          Filesize

          4KB

        • memory/4776-1-0x0000000000390000-0x0000000000391000-memory.dmp

          Filesize

          4KB

        • memory/4776-2-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/4776-3-0x00000000003B0000-0x00000000003B1000-memory.dmp

          Filesize

          4KB

        • memory/4776-4-0x00000000003C0000-0x00000000003E9000-memory.dmp

          Filesize

          164KB

        • memory/4776-5-0x0000000000C20000-0x0000000000C4F000-memory.dmp

          Filesize

          188KB

        • memory/4776-9-0x00000000003C0000-0x00000000003E9000-memory.dmp

          Filesize

          164KB

        • memory/4776-12-0x0000000000C50000-0x0000000000C77000-memory.dmp

          Filesize

          156KB

        • memory/4776-16-0x00000000003C0000-0x00000000003E9000-memory.dmp

          Filesize

          164KB

        • memory/4776-18-0x00000000003C0000-0x00000000003E9000-memory.dmp

          Filesize

          164KB