Analysis

  • max time kernel
    163s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    20-03-2022 01:28

General

  • Target

    8ea3556813e7d871f37b1d3954c278a08da132f48f5d5c475c075415b9adba9f.exe

  • Size

    1.6MB

  • MD5

    2418bc399c5e287e7c25c7c0d83a5c13

  • SHA1

    a3e6d95474651b6ccd55cf125c898792507fc958

  • SHA256

    8ea3556813e7d871f37b1d3954c278a08da132f48f5d5c475c075415b9adba9f

  • SHA512

    cc548c5b2e1281185c53ee8d941f8e681cf9a3f11df20e7b1eb98ea07b1521b02677e7e4b7f8ae1dc6ffcdfc477ce7ba1c3e862c6a671a01e7dd147206dd19a2

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ea3556813e7d871f37b1d3954c278a08da132f48f5d5c475c075415b9adba9f.exe
    "C:\Users\Admin\AppData\Local\Temp\8ea3556813e7d871f37b1d3954c278a08da132f48f5d5c475c075415b9adba9f.exe"
    1⤵
      PID:4480
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
      • Modifies data under HKEY_USERS
      PID:2352

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2352-140-0x000001AC6DC60000-0x000001AC6DC70000-memory.dmp
      Filesize

      64KB

    • memory/2352-141-0x000001AC6DCC0000-0x000001AC6DCD0000-memory.dmp
      Filesize

      64KB

    • memory/2352-142-0x000001AC70260000-0x000001AC70264000-memory.dmp
      Filesize

      16KB

    • memory/4480-134-0x00000000743D0000-0x0000000074B80000-memory.dmp
      Filesize

      7.7MB

    • memory/4480-135-0x0000000000AD0000-0x0000000000C78000-memory.dmp
      Filesize

      1.7MB

    • memory/4480-136-0x0000000005C10000-0x00000000061B4000-memory.dmp
      Filesize

      5.6MB

    • memory/4480-137-0x0000000005660000-0x00000000056F2000-memory.dmp
      Filesize

      584KB

    • memory/4480-138-0x0000000005660000-0x0000000005C04000-memory.dmp
      Filesize

      5.6MB

    • memory/4480-139-0x0000000005A50000-0x0000000005A5A000-memory.dmp
      Filesize

      40KB

    • memory/4480-143-0x0000000009150000-0x00000000091EC000-memory.dmp
      Filesize

      624KB