Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 18:13

General

  • Target

    8d02b0fbf93295c2012bcfa65b9d9f21.exe

  • Size

    378KB

  • MD5

    8d02b0fbf93295c2012bcfa65b9d9f21

  • SHA1

    0fbb778319e3bb3388027acf057ebeec69ee118e

  • SHA256

    e8763858d4d442f27a0d7986f446d8f1fe355d927816ffe4d5d8e1a56541c60a

  • SHA512

    795149d5afcf0420bdb691d8cb27ea11e8b3703df1a1edccd7ad2fd340980a235891befd5cd3a7a0a2e8eb41054d223357dcae1f7bc49b30545b01906a8ed9d4

  • SSDEEP

    6144:C7BWAbr4kYZV7spCzaforuUaGn+m6914eqxtw+Z703iOoMon2CohBgcPoob:CVhbh+Kp6aJGn+mA3yZY3on2CoH

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d02b0fbf93295c2012bcfa65b9d9f21.exe
    "C:\Users\Admin\AppData\Local\Temp\8d02b0fbf93295c2012bcfa65b9d9f21.exe"
    1⤵
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2860-0-0x0000000000400000-0x000000000050B000-memory.dmp

    Filesize

    1.0MB

  • memory/2860-1-0x0000000000400000-0x000000000050B000-memory.dmp

    Filesize

    1.0MB

  • memory/2860-4-0x0000000000400000-0x000000000050B000-memory.dmp

    Filesize

    1.0MB