Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 18:02

General

  • Target

    b551c799a3f1b42f9c8c91ab879d7983.exe

  • Size

    226KB

  • MD5

    b551c799a3f1b42f9c8c91ab879d7983

  • SHA1

    d0762e0aebf4d5bd81dd90e078802ecb8f2e9815

  • SHA256

    0462913af40c15c258e618f02265d46f608b691011317c975e9124d036c2d5c2

  • SHA512

    2369d92384e0afa328b84ee3147d4e2c784b86e6393aaedda262b23070d34cfb1b8c2e7271977588cd01b8e420867a369b05188d59961f707c504467dfefbf26

  • SSDEEP

    3072:xGBDvAHfpS+1Wn5+jr2D5ErwSklrDb2VPwOfHmOzK4Rkakl2qpJ/4nAw780TPtY:eDvypV2D5E1DPwOfGQ/SamxJOo0TPtY

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b551c799a3f1b42f9c8c91ab879d7983.exe
    "C:\Users\Admin\AppData\Local\Temp\b551c799a3f1b42f9c8c91ab879d7983.exe"
    1⤵
    • Drops file in Windows directory
    PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-0-0x0000000000AE0000-0x0000000000B20000-memory.dmp

    Filesize

    256KB

  • memory/1680-1-0x00000000002B0000-0x00000000002F0000-memory.dmp

    Filesize

    256KB

  • memory/1680-2-0x0000000000020000-0x0000000000040000-memory.dmp

    Filesize

    128KB

  • memory/1680-3-0x00000000000A0000-0x00000000000CF000-memory.dmp

    Filesize

    188KB

  • memory/1680-7-0x0000000000020000-0x0000000000040000-memory.dmp

    Filesize

    128KB

  • memory/1680-15-0x0000000000020000-0x0000000000040000-memory.dmp

    Filesize

    128KB