Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 04:22

General

  • Target

    423ace3d3c152537954b5456233d29e080b34bbe100d78d4606f649182f63760.exe

  • Size

    5.9MB

  • MD5

    105ac4922f21d2c906ab4528b18802d9

  • SHA1

    039e4ba9d96cb530b3c0b6cc1117ec111bf78b59

  • SHA256

    423ace3d3c152537954b5456233d29e080b34bbe100d78d4606f649182f63760

  • SHA512

    7e9d7a3dba9f9609348520c74d54b87aa99f163a82f7398f611608a6a71a3e064c78a4a4319c36d814806041454f61cdeef9f74704614414b3169126edc502bb

  • SSDEEP

    98304:NGrMJghhdZbWcrkIXLKMJ9m5Rz2xdG8aw2F6BCEM2gk+1EndEGTnr+zp1bVryDam:N7+h37SgPdLgk+1EndHqPbVruhmL

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\423ace3d3c152537954b5456233d29e080b34bbe100d78d4606f649182f63760.exe
    "C:\Users\Admin\AppData\Local\Temp\423ace3d3c152537954b5456233d29e080b34bbe100d78d4606f649182f63760.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads