Analysis

  • max time kernel
    156s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    19-03-2022 17:07

General

  • Target

    98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe

  • Size

    1.6MB

  • MD5

    a8004453810b0b62da1aa007091ce3e2

  • SHA1

    d8eab7301e6ac2ac9a24f6395e4024e04e15697d

  • SHA256

    98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a

  • SHA512

    c6cb7c15b0b0b17d383853e072dd77ca7bd32d2698add1d5277ebb144cc4c0bc60164723e63c9e768129059b160ff7f7a7bf3d33eecf4fdd5ab4362272ec4ae6

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe
    "C:\Users\Admin\AppData\Local\Temp\98c04d9dbe5fcb2d920502beeb6dd342459d0d2ee48ad06402d538c8cdeb806a.exe"
    1⤵
      PID:5020
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
      • Modifies data under HKEY_USERS
      PID:1956

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1956-140-0x000002A5621A0000-0x000002A5621B0000-memory.dmp

      Filesize

      64KB

    • memory/1956-141-0x000002A562A60000-0x000002A562A70000-memory.dmp

      Filesize

      64KB

    • memory/1956-142-0x000002A565020000-0x000002A565024000-memory.dmp

      Filesize

      16KB

    • memory/5020-134-0x00000000748C0000-0x0000000075070000-memory.dmp

      Filesize

      7.7MB

    • memory/5020-135-0x0000000000F00000-0x00000000010A8000-memory.dmp

      Filesize

      1.7MB

    • memory/5020-136-0x0000000005F40000-0x00000000064E4000-memory.dmp

      Filesize

      5.6MB

    • memory/5020-137-0x0000000005A50000-0x0000000005AE2000-memory.dmp

      Filesize

      584KB

    • memory/5020-138-0x0000000005990000-0x0000000005F34000-memory.dmp

      Filesize

      5.6MB

    • memory/5020-139-0x0000000001A00000-0x0000000001A0A000-memory.dmp

      Filesize

      40KB

    • memory/5020-143-0x0000000009370000-0x000000000940C000-memory.dmp

      Filesize

      624KB