Analysis

  • max time kernel
    119s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    31-01-2022 00:44

General

  • Target

    988ba4728db4c7fb5bbe34c07c298856.exe

  • Size

    830KB

  • MD5

    988ba4728db4c7fb5bbe34c07c298856

  • SHA1

    57192a3a61012f0eeb7afab21c97e3b23a08cbce

  • SHA256

    05ba36adc06b3ca377293860d2fc9663ef886d04f13b524f34d1d21bce10fb84

  • SHA512

    54cf9189d057aacdd2e5d989660a045590cbe361871c8f89d1af3c662b146cf6f6c9647b2e9d2507022ff73b9bdb85e3aa6735af7eb6914880d41375d415667b

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\988ba4728db4c7fb5bbe34c07c298856.exe
    "C:\Users\Admin\AppData\Local\Temp\988ba4728db4c7fb5bbe34c07c298856.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    PID:3480

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads