Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 19:45

General

  • Target

    96b9f45afa427f4046f96b3c7a90e814a660d4c8e933cf2efeeff2d522ba89fc.exe

  • Size

    3.4MB

  • MD5

    106f3747c5b58d545735448bb843cfd0

  • SHA1

    a643237e76edb67b43af5658df12baa6a47e4c77

  • SHA256

    96b9f45afa427f4046f96b3c7a90e814a660d4c8e933cf2efeeff2d522ba89fc

  • SHA512

    049ef3ff8b567d42819116f8ef107c98ca7830a371da0a5566416fea094eead740325336a785ae74c8dafceed6166f6fcad88b633dcce6bd2e2dfa05beba7bee

  • SSDEEP

    49152:9NrYtbAbbc0CGVHCcOxqoppLXCIYrKMtlBdukXK6f/8LYFlNKVZ+/LcDgUMkT8:9rbc0dxOfbCIYflBduQn8WR

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96b9f45afa427f4046f96b3c7a90e814a660d4c8e933cf2efeeff2d522ba89fc.exe
    "C:\Users\Admin\AppData\Local\Temp\96b9f45afa427f4046f96b3c7a90e814a660d4c8e933cf2efeeff2d522ba89fc.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1632-0-0x0000000000400000-0x0000000000A49000-memory.dmp

          Filesize

          6.3MB

        • memory/1632-1-0x0000000000230000-0x0000000000233000-memory.dmp

          Filesize

          12KB

        • memory/1632-2-0x0000000000400000-0x0000000000A49000-memory.dmp

          Filesize

          6.3MB

        • memory/1632-4-0x0000000000400000-0x0000000000A49000-memory.dmp

          Filesize

          6.3MB

        • memory/1632-5-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1632-6-0x0000000000400000-0x0000000000A49000-memory.dmp

          Filesize

          6.3MB

        • memory/1632-8-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB