Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10 -
submitted
30-06-2020 13:34
Static task
static1
Behavioral task
behavioral1
Sample
cgc.bin.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
cgc.bin.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
cgc.bin.exe
-
Size
25KB
-
MD5
6516bedffc29d38b6694c9c4fe5133e0
-
SHA1
53d6e4f4618cde418a522688a1fa67dd2368ee3d
-
SHA256
279f334ec8521dfec80cfc186e709f88c88a030515024c9ef16f7063aec9dbbb
-
SHA512
27dd50ac74a5753df93bd75c1cfd8c621b04e552d406307338e5ecd1cc85e65e6054b50dc2126a3b27fb280e63f2a7ba45788f963eb1ef3d7e4eaa867db76c1d
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
cgc.bin.exepid process 3100 cgc.bin.exe 3100 cgc.bin.exe 3100 cgc.bin.exe 3100 cgc.bin.exe -
Drops startup file 1 IoCs
Processes:
cgc.bin.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winup.lnk cgc.bin.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3100-0-0x00000000046C0000-0x00000000046C1000-memory.dmpFilesize
4KB
-
memory/3100-1-0x0000000004EC0000-0x0000000004EC1000-memory.dmpFilesize
4KB
-
memory/3100-2-0x00000000046C0000-0x00000000046C1000-memory.dmpFilesize
4KB
-
memory/3100-3-0x0000000004EC0000-0x0000000004EC1000-memory.dmpFilesize
4KB