Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 14:36

General

  • Target

    cbaa354cebdeeb2f407efda4c82e6e79.exe

  • Size

    220KB

  • MD5

    cbaa354cebdeeb2f407efda4c82e6e79

  • SHA1

    6a68ea3e7cfcce1e0e8da84204f3feef87f54cf0

  • SHA256

    200ccaa5583afe75af1dd28784d5cdeb4c632d777b100abedcf33d1b08039ff8

  • SHA512

    069771679bed34755771cb270f884acd0b89b7f6d231e4c944e51cf70d61f3dec01bec4a293d4d05ce588cc6110bac923260aaf39605747fd49ba09b0add8517

  • SSDEEP

    6144:Mexnnh4z55m7vbGCLE4CLUact2Gvr85o9tqIjMxvK:ZnOm7zILUNko9tFMxS

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbaa354cebdeeb2f407efda4c82e6e79.exe
    "C:\Users\Admin\AppData\Local\Temp\cbaa354cebdeeb2f407efda4c82e6e79.exe"
    1⤵
    • Drops file in Windows directory
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2248-4-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2248-3-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2248-2-0x0000000000160000-0x0000000000180000-memory.dmp

    Filesize

    128KB

  • memory/2248-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2248-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2248-5-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/2248-9-0x0000000000160000-0x0000000000180000-memory.dmp

    Filesize

    128KB

  • memory/2248-17-0x0000000000160000-0x0000000000180000-memory.dmp

    Filesize

    128KB