Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 15:12

General

  • Target

    bc1e59e393185c22e669247a68de536d.exe

  • Size

    367KB

  • MD5

    bc1e59e393185c22e669247a68de536d

  • SHA1

    044d563906f425ed8eb14631feeea5005c000b51

  • SHA256

    063ba328be1a05fbc5216d590ef650a9f3ed8acd765191aad6b1c222b4d5c804

  • SHA512

    6fc8538eb929092a55c7dec948909fbde7afe51ea036894ee3d7ff8afd73feb12d92092da9a6e03be9e7d6e08002e2b7219ee10d2707db6344a430712a7eb1a5

  • SSDEEP

    6144:dMQK7Gr/u9WzS/H2qNTjNPcX3X9Xt+UPoTIQyC+aldF/6J7q/hYJJg/1RGAoyh:dMjGr/u9EAZk399+Duyh

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc1e59e393185c22e669247a68de536d.exe
    "C:\Users\Admin\AppData\Local\Temp\bc1e59e393185c22e669247a68de536d.exe"
    1⤵
    • Drops startup file
    PID:3720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3720-0-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

    Filesize

    4KB

  • memory/3720-1-0x0000000000FC0000-0x0000000000FC2000-memory.dmp

    Filesize

    8KB

  • memory/3720-2-0x0000000000FD0000-0x0000000000FD1000-memory.dmp

    Filesize

    4KB

  • memory/3720-3-0x0000000001620000-0x0000000001621000-memory.dmp

    Filesize

    4KB

  • memory/3720-4-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/3720-5-0x0000000002030000-0x0000000002031000-memory.dmp

    Filesize

    4KB

  • memory/3720-6-0x0000000002040000-0x0000000002041000-memory.dmp

    Filesize

    4KB

  • memory/3720-9-0x0000000002050000-0x0000000002051000-memory.dmp

    Filesize

    4KB

  • memory/3720-7-0x0000000003CC0000-0x0000000003CEC000-memory.dmp

    Filesize

    176KB

  • memory/3720-11-0x00000000020B0000-0x00000000020B1000-memory.dmp

    Filesize

    4KB

  • memory/3720-12-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/3720-14-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/3720-16-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/3720-15-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/3720-17-0x0000000003C90000-0x0000000003C91000-memory.dmp

    Filesize

    4KB

  • memory/3720-18-0x0000000003CA0000-0x0000000003CA1000-memory.dmp

    Filesize

    4KB

  • memory/3720-19-0x0000000003CB0000-0x0000000003CB1000-memory.dmp

    Filesize

    4KB

  • memory/3720-20-0x0000000003CF0000-0x0000000003CF1000-memory.dmp

    Filesize

    4KB

  • memory/3720-22-0x0000000003D00000-0x0000000003D01000-memory.dmp

    Filesize

    4KB

  • memory/3720-21-0x0000000003D10000-0x0000000003D11000-memory.dmp

    Filesize

    4KB

  • memory/3720-25-0x0000000003D30000-0x0000000003D31000-memory.dmp

    Filesize

    4KB

  • memory/3720-27-0x0000000003D40000-0x0000000003D41000-memory.dmp

    Filesize

    4KB

  • memory/3720-29-0x0000000003D60000-0x0000000003D61000-memory.dmp

    Filesize

    4KB

  • memory/3720-30-0x0000000003D80000-0x0000000003D81000-memory.dmp

    Filesize

    4KB

  • memory/3720-31-0x00000000020A0000-0x00000000020A2000-memory.dmp

    Filesize

    8KB

  • memory/3720-28-0x0000000003D50000-0x0000000003D51000-memory.dmp

    Filesize

    4KB

  • memory/3720-32-0x0000000003D70000-0x0000000003D71000-memory.dmp

    Filesize

    4KB

  • memory/3720-33-0x0000000003D20000-0x0000000003D21000-memory.dmp

    Filesize

    4KB

  • memory/3720-34-0x00000000040E0000-0x00000000040E1000-memory.dmp

    Filesize

    4KB

  • memory/3720-38-0x0000000003B10000-0x0000000003B11000-memory.dmp

    Filesize

    4KB