Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 07:11

General

  • Target

    9b147911e11c67b3eb405409979fd81a.exe

  • Size

    321KB

  • MD5

    9b147911e11c67b3eb405409979fd81a

  • SHA1

    f44f15c24b8797b96e53b4a5b08723322e99ce63

  • SHA256

    060a27c5e8887c41d2c4fedd572d0af20e581d0293706f866f060ed0b9072cbf

  • SHA512

    b1c00c42ceb10485fde4f2ee64214fdc30c781290f2e854dddfa85c4e0657db1679e2ffc8d8befdd6bf66663d269291b79b8b273e459009d40fb200fc152e2c6

  • SSDEEP

    6144:LXxv1d6YZkpj02XbFyVKNfA28pcEUL9N+7pfmle74hbk:LXHd6YZkpj02LEViDOcd+pml2Abk

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b147911e11c67b3eb405409979fd81a.exe
    "C:\Users\Admin\AppData\Local\Temp\9b147911e11c67b3eb405409979fd81a.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-0-0x0000000001BB0000-0x0000000001CB0000-memory.dmp

    Filesize

    1024KB

  • memory/1808-2-0x0000000001CB0000-0x0000000001CDF000-memory.dmp

    Filesize

    188KB

  • memory/1808-9-0x00000000054B0000-0x00000000054D7000-memory.dmp

    Filesize

    156KB